Cybersecurity in 2017: Automation, Adversaries and Orchestration

By Rick Howard

Rick Howard is the Chief Security Officer for Palo Alto Networks where he is responsible for the company's internal security program, the oversight of the Palo Alto Networks Threat Intelligence Team and the development of thought leadership for the cyber security community. His prior jobs include the CISO for TASC, the GM of iDefense and the SOC Director at Counterpane. He served in the U.S. Army for 23 years and spent the last 2 years of his career running the Army's CERT. Rick holds a Master of Computer Science degree from the Naval Postgraduate School and an engineering degree from the U.S. Military Academy. He taught computer science at the Military Academy and contributed as an executive editor to two books: "Cyber Fraud: Tactics, Techniques and Procedures" and "Cyber Security Essentials."

Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.

Crossing the Last Mile With Threat Intelligence

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:InternationalTagged with:

Related Articles

How Safe Would We Be Without Section 702?

SUBSCRIBER+EXCLUSIVE INTERVIEW — A provision of the Foreign Intelligence Surveillance Act that has generated controversy around fears of the potential for abuse has proven to be crucial […] More

Search

Close