Network Detection & Response , Network Firewalls, Network Access Control , Next-Generation Technologies & Secure Development

Exposing Criminal Conversations Part 2: Gain Visibility

VMware's Chad Skipper on How to Shut Down the Dangerous Chatter
Chad Skipper, Global Security Technologist, VMware

Visibility is key to exposing criminal conversations. But visibility into what? And how exactly is it attained? Chad Skipper of VMware taps into his case files to discuss how to enhance visibility across environments and put a stop to criminal conversations.

In part two of this two-part video interview with Information Security Media Group, Skipper discusses:

  • Why visibility is key;
  • What inhibits visibility today;
  • Examples of how enterprises have exposed and stopped criminal conversations.

In Part 1 of this interview, Skipper discusses what criminal conversations are and how to expose them.

Skipper serves as Global Security Technologist in the Network and Advanced Security Business Group at VMware. With more than 30 years in Information Security, Skipper serves as an executive security technologist and strategist and has played a significant role in the security design and architecture of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Office of the CTO at Dell and Cisco. Skipper is a USAF veteran, contributor to a variety of threat intelligence topics, keynotes and is author of Next-Generation Anti-Malware Testing for Dummies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.