Cybersecurity Blog: The Cyber Scene is evolving, are you?

Return to blog
Chris Coryea is the Head of International Cyber Intelligence Services for Leidos. In this role, he oversees the EMEA and Asia-Pac Security Intelligence Centers for Leidos and is responsible for leading a global team of Cyber Intelligence Analysts, Pen Testing Engineers, Incident Responders and Open-Source Intelligence (OSINT) Analysts. In 2003, Chris joined Lockheed Martin in the United States where he helped to establish the Corporate Information Security Office. He held various cybersecurity leadership roles across US and moved to London in 2010 to assist global organizations in the application of a proven cybersecurity tradecraft against the ever-evolving threat landscape. Applying the knowledge gained from his 14 year journey with Lockheed Martin and Leidos, Chris is a prominent speaker who has delivered numerous presentations across the globe including a recent keynote speech at RSA Singapore and Black Hat Europe. Chris enjoys providing thought leadership on cybersecurity and has authored numerous white papers and blogs for Lockheed Martin, Leidos and industry. Chris holds a BS in Management Information Systems from Kansas State University and a MS in Information Technology Management from Rensselaer Polytechnic Institute.

The United States and Europe have never quite been on the same page when it comes to privacy. Traditionally, European governments have taken a more stringent approach regarding their laws and regulations than the US Federal Government. Complicating matters further, brand new European privacy laws that are even stricter may be headed on a collision course with US-based firms, particularly with organizations within that embrace the Internet of Things (IoT) in record numbers. As a result, companies that do business internationally will need a solid plan and dedicated tools to keep ahead of the new regulations.

Read more

Recently, I discussed the importance of situational awareness to Security Operations Center (SOC) effectiveness. Without anticipatory intelligence and context surrounding cyber-threats, SOCs receive a lower return on investment on tools such as threat feeds and endpoint solutions.

Read more

As a manager of a Security Intelligence Center (SIC), I can say first hand that few things are more frustrating than investing in a cybersecurity product that fails to deliver what your security team truly needs to be successful when it comes to true situational awareness.

Read more


“You will never reach your destination if you stop and throw stones at every dog that barks.” – Sir Winston Churchill


This summer our team has been traveling the globe with our message of cyber enlightenment. Through real-world accounts of how we’ve helped some of the world’s most prominent companies mature their cybersecurity posture, our analysts have inspired hope and doled out practical steps both practitioners and leadership can take to shore up their networks.

Read more

Find out how one analyst used social media to collect enough intel in five hours to breach a Fortune 500 company.

What is open-source intelligence (OSINT)? Quite simply, its intelligence collected from publically available information such as Facebook, LinkedIn and even the dark web. Are you using information available from these sources? Adversaries are!

Read more