Hi [[ session.user.profile.firstName ]]

IntSights

  • Date
  • Rating
  • Views
  • OSINT: The Secret Weapon in Hunting Nation-State Campaigns
    OSINT: The Secret Weapon in Hunting Nation-State Campaigns Alon Arvatz, Co-Founder at IntSights Cyber Intelligence Recorded: Nov 15 2017 56 mins
    The common notion is that state actors engaged in APT campaigns work in solitude and launch their destructive attacks in the stealthiest manner possible, rendering all pre-emptive intelligence actions against them useless. Is that what happens today? Is their way to perform reconnaissance activities and monitoring criminals on darknet and Clear Web to discover these campaigns? Discussing real use cases of state actors engaged in APT campaigns, explore what can be done with the available intelligence tools we have today, specifically from the Dark Web.

    The discussion will include real use cases of APT actors performing reconnaissance activities on darknet platforms and on the Clear Web. It will provide useful tips for organizations who wish to assess their exposure and vulnerability to such attacks by using the same reconnaissance methods as the threat actors themselves and advanced OSINT tools.

    About the presenter:

    Alon Arvatz served in an elite intelligence unit in the Israel Defense Forces. While serving for 3 years in the most innovative and operational setting, Alon led and coordinated large operations in the cyber intelligence world. Alon established Cyber School, a center providing teenagers with courses, seminars and workshops on cyber intelligence. Today, Alon is the Co-Founder & VP of Product Development at IntSights. While serving in an elite intelligence unit in the Israel Defense Forces Alon lead core cyber threats discussions investigating and deliberating main cyber topics. He also established a cyber center for teaching cyber and have a lot experience in presenting and teaching the cyber world in general and the hackers and dark and deep web in specific.
  • Dark Web Tutorial: How to Use the Dark Web to Enable Proactive Security
    Dark Web Tutorial: How to Use the Dark Web to Enable Proactive Security Alon Arvatz, Co-founder & CPO Recorded: Jul 18 2017 64 mins
    The Dark Web is a critical resource to help security teams move from a reactive to a proactive posture. Recently, IntSights examined how dark web forums focused on recruiting and collaborating insiders. Though our findings focused on insider threats, our method highlights how examining the Dark Web has become a crucial part of implementing proactive security. In this talk, security researcher Alon Arvatz will go through:

    - Methods and techniques to uncover critical intelligence to reduce enterprise risk.
    - How to extract intelligence from Dark Web using OSINT WebINT tools and methodologies.
    - How security teams can use threat intelligence to incorporate proactive controls.

    About the speaker
    Alon Arvatz, a former IDF intelligence officer, was tasked with exploring the Dark Web to find threats to his country
  • What Every Security Professional Should Know About the Dark Web
    What Every Security Professional Should Know About the Dark Web Alon Arvatz, Co-founder & CPO Recorded: Jun 27 2017 62 mins
    The Dark Web. A lot of scary things happen there--but it’s also a tremendously useful resource to bolster security. But you have to know how to use it and where to look. In this webinar, we’ll help security teams better leverage the Dark Web to protect the enterprise.

    Alon Arvatz, a former IDF intelligence officer, was tasked with exploring the Dark Web to find threats to his country. He’ll share his knowledge and techniques including:

    · Know where to look and what to look for in the Dark Web
    · Leverage the Dark Web to predict attacks
    · Track and identify threat actors
  • Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]
    Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series] Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights Recorded: Jun 6 2017 42 mins
    Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?

    Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.

    About the Presenter:
    Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.

Embed in website or blog