SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

“Adding a layer of IoA intelligence…..”

Ken Dunham

2 min read
in Cyber Citizens, Executives, Quotes

 

“Adding a layer of IoA intelligence on top of a security program requires a high level of commitment to be successful. Competing priorities in organizations often drive attention into other areas. The advent of big data analytics, telemetry, visibility, and automation may help alleviate the quest for rapid IoC integration by allowing some organizations start concentrating on more strategic IoA.” Ken Dunham – Principal Security Consultant at World Wide Technology

Source: Optiv 

About Ken Dunham

Ken Dunham brings more than 27 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions.

Throughout his career, Dunham has maintained a reputation as an industry pioneer, responding to his first virus encounter in 1989 that led to one of the most popular freeware anti-virus programs and informational website globally in the early 1990’s.

His work with About.com laid the foundation for human connections and support through the Internet. In the late 1990s, Dunham stood up new training programs for the U2, Warthog and Predator systems for the United States Air Force as well as computer-based training and webbased training solutions for DirectTV.

At the turn of the century Dunham was a key player in the iDEFENSE innovative movement for responsible disclosure and initial cyber intelligence offerings in the industry. While at VeriSIGN, Dunham managed all war room crisis events globally and regularly briefed top level executives and government officials.

For iSIGHT Partners, he helped to create a threat intelligence platform and program. He also managed a global incident response team and was a front-line responder on emergent threats such as point-of-sale malware breaches, espionage attacks, counter-terrorism, eCrime and hacktivism.

Previously, Stephenson was CEO of Reva Systems, acquired by ODIN, and Xedia Corporation, acquired by Lucent. He was awarded “CEO of the Year” by the Massachusetts Telecommunications Council for his work at Xedia Corp.

In recent years he has spent the majority of his time providing strategic advisory services on the evolution of the global IT market.

Related

Tags: CybersecurityExecutivesExecutives QuotesInfosecIOC quoteKen Dunhamquotes
8
VIEWS
ADVERTISEMENT

Related Posts

Software Quality Assurance and Testing for Beginners

QA Quality Assurance and Software Testing Fundamentals

June 24, 2022
Software Quality Assurance and Testing for Beginners

Software Quality Assurance and Testing for Beginners

June 24, 2022
Software Quality Assurance (Internal Audit and IT Audit)

Handbook of Software Quality Assurance, Fourth Edition

June 24, 2022
Software Quality Assurance (Internal Audit and IT Audit)

Software Quality Assurance (Internal Audit and IT Audit)

June 24, 2022

More Articles

Document

Payment Card Industry (PCI) Data Security Standard PFI Preliminary Incident Response Report

May 18, 2022

Hexistor Data Protection Services Podcast

June 17, 2022
Book

The Technology Tail: A Digital Footprint Story (Communicate with Confidence)

December 15, 2021
Alerts

Beware of Digital ID attacks: your face can be spoofed!

January 20, 2022
Document

Gramm-Leach-Bliley Act Compliance

June 7, 2022
Course

GLBA Training

June 14, 2022

Data breach at third-party provider exposes medical information of US healthcare patients

July 6, 2021
Alerts

Phishing campaign delivers malware to steal your passwords

April 29, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....