Fraud Management & Cybercrime , Fraud Risk Management , Governance & Risk Management

Life Beyond Blocking: Adopting Behavior-Based Cybersecurity

Forcepoint's Carl Leonard Says More Real-Time Response to Behavior Required
Carl Leonard, principal security analyst, Forcepoint

To arrest incoming malware, users browsing to bad sites or phishing attack attempts, among other threats, many cybersecurity tools are designed to block or allow specific activities based on prescribed rules, says Carl Leonard of Forcepoint.

See Also: Kaspersky Lab's New Focus on Fraud Prevention

But with insider breaches continuing regardless, Leonard says there's a need for a more risk-adaptive approach to enterprise protection and to respond to user behavior by adjusting security policies in real time.

In a video interview at the recent Infosecurity Europe conference, Leonard discusses:

  • The pursuit of risk-based security over a more threat-centric approach;
  • How to achieve more adaptive protection;
  • Mitigating the insider risk.

Leonard, principal security analyst at Forcepoint, helps direct the company's global security lab research efforts and advises business leaders on solving the challenges posed by the threat landscape. He's been a a featured speaker at numerous conferences, including RSA, Infosecurity Europe and eCrime.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.