As Level 3's senior vice president of managed security services, Richter is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting, and sales with several technology product and services organizations. He served most recently as vice president, managed security services, at CenturyLink. For more than a decade, Richter has assisted numerous IT organizations in adapting their premises-based infrastructure risk management programs and security controls to outsourced, virtualized, and shared-infrastructure services. He has acted as both a board member and technical advisor for technology firms, and writes and speaks regularly about cybersecurity, risk management, and IT outsourcing. Richter is also member of the ISSA and ISACA, and holds Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) certifications.
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Financial services firms, especially in the banking industry, are constantly faced with security threats from cybercriminals who use DDoS attacks, malware, phishing and other methods to try and steal sensitive customer data, commit fraud and identity theft. Security breaches are a strategic risk to financial...
James serves as Chief Scientist at Flashpoint where he helps guide research and engages in thought leadership. Prior to joining Flashpoint, Mr. James was the Head of Cyber Intelligence at Deloitte & Touche LLP. An internationally renowned information security specialist, He has more than fifteen years of experience in programming, network security, digital forensics, malware research, cryptography design, cryptanalysis, counterintelligence, and protocol exploitation. James provides advisory services to a wide range of government agencies and Fortune 500 organizations including America's top financial services institutions. Credited with the identification of Zeus and other malware, James is an active contributor to the evolution of security practices and counterintelligence tactics and strategies. James was the founding force behind the CryptoLocker Working Group, where he and his team of researchers were acknowledged for their critical role in disrupting CryptoLocker as part of an FBI-led takedown operation. Over the years, he has championed other takedowns of criminal organizations through his strategic alliances with industry, academia, and law enforcement.
As Level 3's senior vice president of managed security services, Richter is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting, and sales with several technology product and services organizations. He served most recently as vice president, managed security services, at CenturyLink. For more than a decade, Richter has assisted numerous IT organizations in adapting their premises-based infrastructure risk management programs and security controls to outsourced, virtualized, and shared-infrastructure services. He has acted as both a board member and technical advisor for technology firms, and writes and speaks regularly about cybersecurity, risk management, and IT outsourcing. Richter is also member of the ISSA and ISACA, and holds Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) certifications.
As Level 3's senior vice president of managed security services, Richter is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting, and sales with several technology product and services organizations. He served most recently as vice president, managed security services, at CenturyLink. For more than a decade, Richter has assisted numerous IT organizations in adapting their premises-based infrastructure risk management programs and security controls to outsourced, virtualized, and shared-infrastructure services. He has acted as both a board member and technical advisor for technology firms, and writes and speaks regularly about cybersecurity, risk management, and IT outsourcing. Richter is also member of the ISSA and ISACA, and holds Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) certifications.
Michael Versace is a Global Research Director at IDC Financial Insights, responsible for the risk technology and infrastructure marketplaces worldwide. He provides prospective on how leaders in the industry are leveraging third-platform technologies and strategies to better serve customers, develop new markets, meet business goals and compliance requirements, and transform business models through innovations in the consumer IT ecosystem, service provider, and enterprise technology marketplaces. Mr. Versace also serves as the Financial Services industry lead on the maturity and adoption of Big Data and Analytics technologies, and is the co-sponsor of Security Insights, a specialized research practice dedicated to security strategies and solutions across IDC vertical markets.
Mr. Versace brings background and experience to bridge a wide range of business and technology challenges facing today's global risk managers and technology executives. His 25 year career in financial services has included extensive interactions with central bankers, corporate and retail banks, investment firms, and the risk technology communities at both an enterprise and industry level.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.