Next-Generation Technologies & Secure Development , Threat Intelligence

Understanding the Mindset of Attackers

IBM's Etay Maor on Building an Effective Cybersecurity Strategy
Etay Maor, executive security advisor, IBM Security

An important component of building an effective cybersecurity strategy is to understand the mindset of attackers, says IBM Security’s Etay Maor, who offers insights.

See Also: The Operationalization of Threat Intelligence Programs

”You can’t really defend unless you understand how an attacker operates. … It’s a continuous process,” Maor says.

In a video interview with Information Security Media Group at the recent RSA Conference 2019 in Singapore, Maor discusses:

  • The benefits of thinking like an adversary;
  • Blue team, red team, and purple team exercises;
  • How to transition from a defend-only mindset.

Maor is an executive security adviser at IBM Security, where he leads security and fraud-fighting awareness and research. Previously, Maor was the head of Cyberthreat Research at RSA Labs, where he managed malware research and intelligence teams.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.