Governance , Next-Generation Technologies & Secure Development

Using Threat Intelligence to Prioritize Risks

Mandiant's Chudgar on Why Security Operations Should Be Intelligence-Led
Using Threat Intelligence to Prioritize Risks
Vivek Chudgar, senior director-APAC, Mandiant Consuting Services

Businesses need to transform their security operations, using threat intelligence to prioritize the risks they need to address, says Vivek Chudgar, senior director at Mandiant Consulting Services, APAC.

"We have a lot of access to victim intel, to attackers' intelligence to rely on and seek data and information from the underground, where a lot of threat activities are observed, and that's a very powerful enabler to give you another metric by which you can prioritize risk," Vivek says in an interview with Information Security Media Group.

Users of threat intelligence need to carefully consider threat vectors as well as threat actors, Chudgar says.

Information security professionals should be aware that when they are consuming intel, value can be derived at an operational and a strategic level to make informed decisions, he stresses.

In this interview (see link to audio below photo), he offers insights on:

  • How cyberthreat intelligence can provide the necessary context to inform security decisions across an enterprise;
  • How businesses can transform their security operations to be intelligence-led; and
  • What needs to be done to infuse threat intelligence capabilities across the organization.

Chudgar is responsible for managing client relationships for Mandiant in the APAC region. He has over 19 years of experience across various cybersecurity and technology disciplines. penetration testing. Chudgar has also served as an adviser to CISOs of several major enterprises in APAC and USA. Previously, he was a principal consultant with McAfee's U.S. based Foundstone Professional Services team, where he led the risk and compliance service lines.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.