Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Courses
        • Understanding the New Executive Buying Committee
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Courses
            • Understanding the New Executive Buying Committee
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Cyber Threat Intelligence Prevents Data Breaches
Cybersecurity Minute

How Cyber Threat Intelligence Prevents Data Breaches

Frank DomizioBy Frank DomizioMay 10, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 85 of the Cybersecurity Minute, Frank Domizio discusses how cyber threat intelligence can change businesses for the better, using a data breach at Target as an example.

To hear practitioner and platform insights on how solutions such as ChatGPT will impact the future of work, customer experience, data strategy, and cybersecurity, make sure to register for your on-demand pass to Acceleration Economy’s Generative AI Digital Summit.

Highlights

00:41 — Cyber threat intelligence is the practice of gathering and analyzing information about potential cyber threats. By detecting and responding to these threats before they can cause any damage, cyber threat intelligence can help organizations stay one step ahead of the bad guys.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

01:09 — A few years ago, Target experienced a massive data breach that resulted in the theft of millions of customer records, including credit card numbers, names, and addresses. There’s a strong possibility the breach could have been prevented if Target had better cyber threat intelligence.

01:49 — After the breach, Target invested heavily in cyber threat intelligence and incident response. It implemented new security policies and procedures and invested in new technologies to monitor its systems for potential threats. And its new strategies worked.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

02:19 — Now Frank knows what you’re thinking —that’s great for Target, but you don’t have the resources of a company like that. Here’s the thing. Cyber threat intelligence doesn’t have to be expensive or complicated. There are plenty of affordable tools and technologies available.

02:52 — If you’re not taking cyber threat intelligence seriously, it’s time to start. By investing in the right people, processes, and technologies, you can ensure your organization is protected.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

breach customer Cyber Attack Cybersecurity Cybersecurity Minute data leadership retail
Share. Facebook Twitter LinkedIn Email
Analystuser

Frank Domizio

Deputy CISO
Executive Branch Agency

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

  Contact Frank Domizio ...

Related Posts

How to Implement Zero Trust For Remote Endpoints in the Enterprise

May 28, 2023

Innovation Profile: How Generative AI Enhances ServiceNow Platforms to Enable Better Customer Experiences

May 26, 2023

Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

May 26, 2023

Innovation Profile: How the Endor Labs Platform Leverages Generative AI for Cybersecurity

May 26, 2023
Add A Comment

Comments are closed.

Recent Posts
  • How to Implement Zero Trust For Remote Endpoints in the Enterprise
  • How Celonis Makes Process Mining More Accessible: Embracing Generative AI, Partners
  • C3 AI’s Thomas Siebel on How Generative AI Applies to Business Apps, Impacts Workers
  • Innovation Profile: How Generative AI Enhances ServiceNow Platforms to Enable Better Customer Experiences
  • Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Co-Creation and Growth With Professional Services

May 24, 2023

The Business Impact and Opportunity of Generative AI

May 16, 2023

Healthcare Industry Clouds

May 10, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.