Breach Preparedness , Cybersecurity , Data Breach

Threat Intelligence and the Power of Attribution

Arbor's Paul Bowen on Where Organizations Miss the Mark with Threat Intel
Paul Bowen, principal security technologist, Arbor Networks

Most organizations are good at collecting threat intelligence, but they struggle to operationalize it - and especially to use it for threat attribution. Arbor Network's Paul Bowen tells where organizations are commonly missing the mark.

See Also: Five Steps to Masterminding an Effective Security Awareness Program

Bowen talks about how to maximize threat intelligence in this video interview at Information Security Media Group's Toronto Fraud and Breach Prevention Summit.

In this interview, Bowen discusses:

  • Key components of effective threat intelligence;
  • The value of attribution;
  • Skills and tools to maximize threat intel.

Bowen, principal security technologist at Arbor Networks, has more than 20 years of experience as a security practitioner. His current focus is on advanced threat detection and mitigation with Arbor's new Spectrum Platform. Previously, Bowen spent a decade managing global security for Estée Lauder, and another decade at ArcSight, before and during the HP acquisition. He also previously worked at Mendicant and Fortinet.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.