Using The Totality Of Your Threat Intelligence Data

Having been an international cyber security investigator for the US Department of State, Troy understands that cyber touches everyone in an organization. Whether it be a public entity, a nation state government or a global corporate enterprise, tools need data. And that data is located through engaging true threat intelligence.

Troy Wilkinson, Head of Cyber Security Data Analytics and Research, Interpublic Group begins his session with his thesis of using the totality of data science and threat intelligence to find the next generation of threats. He notes that in the past- within the physical perimeter, there was an over-reliance on technology and the utilization of point solutions to try to solve overarching problems.

Now that the perimeter is exponential, using data points from different silos is going to help connect dots and find things that have been missing along the way. 

He hits on major threats, vulnerabilities as well as solutions and methodologies to realize that goal:

  • Taking action on inbound threat actors
  • Managing insider threat actors
  • Mitigating outbound threat actors
  • Thwarting DLP
  • Engaging threat hunting
  • Realizing the future of detection and response
  • Understanding the new 3rd Party Risk Management (TPRM) reality

Ultimately Troy voices the axiom that cyber security is hard. Yet he follows that thought with the fact that it doesn’t have to be so difficult. Ultimately, it’s the relationships between the board and the cybersecurity team. And the relationships between the cyber team and the IT team. And the relationships between the company and their vendors. Troy’s centrifugal thought is that it’s all about relationships, because the only way to solve new and different problems is collaboratively- it’s the only way to surmount the tremendous challenge at present and ahead.

Participate in Troy’s Threat Intelligence Summit Americas session by registering now.

With a computer science degree in hand, Troy started in law enforcement as a cyber crime investigator, “finding the bad guys who were using fraud, forgery, and other illicit things on the internet back in the early 2000s before cyber crime was really a thing.” Recruited by the US State Department to work in a digital forensics investigation unit out of Kosovo, he handled investigations throughout eastern Europe as well as the Middle East. Upon returning Stateside in 2013, he pivoted into the private sector where he’s been working in leadership roles in cyber security.

Register now for Threat Intelligence Summit March 16-18, 2021

Leave a Reply