RSA Conference , RSA Conference Videos , Video

Threat Intelligence - Define, Share

Level 3's Chris Richter on Getting Most from Actionable Intel
Threat Intelligence - Define, Share

Everyone is talking about threat intelligence. But what are they actually doing to create actionable intel to improve their security posture? Chris Richter of Level 3 offers insight and strategies.

In an interview recorded at RSA Conference 2015, Richter discusses:

  • How best to define threat intelligence;
  • Key tools and skills to maximize it;
  • Do's and don'ts of information sharing.

As Level 3's senior vice president of managed security services, Richter is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, he has held a number of leadership positions in managed security, IT consulting and sales with several technology product and services organizations. He served most recently as vice president, managed security services, at CenturyLink. For more than a decade, he has assisted numerous IT organizations in adapting their premises-based infrastructure risk management programs and security controls to outsourced, virtualized, and shared-infrastructure services. He has acted as both a board member and technical advisor for technology firms, and writes and speaks regularly about cybersecurity, risk management and IT outsourcing.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.