Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence

Breaking Down Silos to Make Intelligence Actionable

Skybox Security's Greg Singh on Effectively Consuming Threat Intel
Greg Singh, technical director, APAC, Skybox Security

Many organizations are looking for pre-defined logic for effectively consuming threat intelligence across information silos, rather than collecting intel and then having to define the logic to make it actionable themselves, says Greg Singh of Skybox Security.

See Also: Webinar | Top SaaS Security Threat Trends in 2024

In this video interview at ISMG's Fraud and Breach Prevention Summit in Bengaluru, India; Singh talks about:

  • The sources of threat intel today;
  • Consuming threat intel in the context of unique business risks;
  • The best approach for breaking down silos of information.

Singh is technical director, APAC, for Skybox Security. He's an information technology veteran with over 20 years in the field. Singh is a subject matter expert in cybercrime, vulnerabilities, malicious code and exploits. Previously, he held various roles with Cylance, Splunk, QuintessenceLabs, Blue Coat and RSA as well as service providers Optus, AAPT and British Telecom.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.