Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

The Need for a New Cybersecurity Agenda

Insights from Jim Anderson, BAE Systems Applied Intelligence
The Need for a New Cybersecurity Agenda
Jim Anderson, BAE Systems Applied Intelligence

The threat landscape has changed dramatically, and so must organizations' approach to cybersecurity. Jim Anderson of BAE Systems Applied Intelligence lays out the elements of the new cybersecurity agenda.

In an interview recorded at RSA Conference 2015, Anderson discusses:

  • What's wrong with our current approach;
  • How we shift to a mindset of business risk;
  • What the board needs to know about security.

Anderson is responsible for the design and execution of BAE System Applied Intelligence's cyber and financial crime business across the Americas. Before joining BAE Systems last year, he held senior sales positions at Cisco, Dell and Hewlett-Packard. Anderson holds an MBA in marketing from the University of Pennsylvania's Wharton School of Business and a bachelor of science degree in electrical engineering and computer science from Princeton University. He also completed Northwestern University's Kellogg School of Management Global Executive Management program.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.