Governance & Risk Management , Incident & Breach Response , Security Operations

Building a Defense-in-Depth Strategy

Level 3's Chris Richter on Applying Threat Intelligence
Building a Defense-in-Depth Strategy

Fighting fraud requires a well-rounded, defense-in-depth strategy that makes good use of appropriate threat intelligence, says Chris Richter of Level 3 Communications.

See Also: Are Security Tools Slowing Your Response?

An essential first step, he says, is selecting a good governance framework that can be used to build a security risk management program. "Without that, you don't have a really good sense of how to apply funding and capital and infrastructure to protect your core assets," he says.

In an interview at Information Security Group's Fraud Summit Chicago, Richter explains:

  • The essential elements of a defense-in-depth strategy;
  • How to apply threat intelligence to such a strategy;
  • The four categories of threat intelligence and how each can be applied;
  • How to apply the right technology and the right framework to make use of threat intelligence.

Richter is senior vice president, managed security services at Level 3 Communications, and is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting and sales with several technology product and services organizations. His most recent previous position was vice president, managed security services, at CenturyLink.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.