Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Detecting Network Security Incidents

ENISA's Rossella Mattioli Reviews New Report
Rosella Mattioli, network and information security expert, ENISA

Rossella Mattioli, a network and information security expert at ENISA, the European Union Agency for Cybersecurity, discusses a new report offering insights on detecting network security incidents.

See Also: How To Cut Through The Web Of Insurance Fraud

The report provides an inventory of detection methods, tools, activities and information sources.

Mattioli also offers recommendations for how computer security incident response teams can be better prepared to protect their constituencies.

In a video interview with Information Security Media Group, Mattioli discusses:

  • Findings from the ENISA report on the best measures to proactively detect network security incidents;
  • What processes and technologies differentiate the most effective and least effective incident response teams;
  • How security organizations can improve their detection and response efforts.

Mattioli joined ENISA in 2013 as a network and information security expert. She has worked on threat modelling and security measures for internet infrastructure, ICS/SCADA, smart grids, IoT, smart cars and airports. She is a CISSP and a certified SIM3 auditor and serves as a Task Force on Computer Security Incident Response Teams steering committee member.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.