Hi [[ session.user.profile.firstName ]]

How to Hunt Threats on the Dark Web to Prevent Cyberattacks

The dark web is a sprawling underground network of secrecy where cybercriminals plan and coordinate cyberattacks against organizations. Monitoring the dark web can provide cybersecurity teams with valuable intelligence for how, when, and where a cyberattack might be launched, but this is no simple task. You need to know what to look for and how to engage on the dark web in order to identify threats without drawing suspicion.

Join IntSights to listen in on this webinar. We’ll share:

-Key dark web sources you need to be monitoring
-How to covertly establish access behind enemy lines
-Common examples of dark web threats
-How to operationalize your dark web monitoring program
Recorded Mar 24 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Liz Chernov, Sr. Cyber Intelligence Analyst, Intsights
Presentation preview: How to Hunt Threats on the Dark Web to Prevent Cyberattacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Evolution of the Dark Web Digital Identity Markets Recorded: Mar 30 2020 40 mins
    Etay Maor
    Leaked credentials have been hot commodities on dark web black markets for years, ranging from small batches to complete database dumps. The security industry has been battling back and forth with cybercriminals, developing new and better ways to authenticate users: 2FA, OOB authentication, device ID, KBA – you name it. Recently, hackers have found new and innovative ways to circumvent even advanced security protocols – like digital browser identity theft, which allows them to almost perfectly mimic a user's digital fingerprints.

    Listen to this webinar to learn more about:

    -The delicate relationship between authentication vs identification vs validation vs verification, from the defender’s side
    -The evolution of the different tools, tactics and procedures used to circumvent and beat authentication solutions viewed from the cybercriminal’s perspective
    -Some of the recent dark web stores and offering, their prices, details and their targets
  • How to Hunt Threats on the Dark Web to Prevent Cyberattacks Recorded: Mar 24 2020 35 mins
    Liz Chernov, Sr. Cyber Intelligence Analyst, Intsights
    The dark web is a sprawling underground network of secrecy where cybercriminals plan and coordinate cyberattacks against organizations. Monitoring the dark web can provide cybersecurity teams with valuable intelligence for how, when, and where a cyberattack might be launched, but this is no simple task. You need to know what to look for and how to engage on the dark web in order to identify threats without drawing suspicion.

    Join IntSights to listen in on this webinar. We’ll share:

    -Key dark web sources you need to be monitoring
    -How to covertly establish access behind enemy lines
    -Common examples of dark web threats
    -How to operationalize your dark web monitoring program
  • Iranian Cyber Warfare and Threat Actors Recorded: Mar 16 2020 43 mins
    Etay Maor and Charity Wright
    Tensions escalated between the United States and Iran when the U.S. assassinated top-ranking military official, General Qasam Soleimani, in early January 2020. The likelihood of retaliatory cyberattacks from Iranian Advanced Persistent Threat (APT) groups against U.S. organizations is high. Now is the time to assess whether your organization is a likely target of Iranian state-sponsored cyber operations, and determine if your team is ready and trained to respond.

    Watch a live recording of a discussion between our Chief Security Officer Etay Maor and Cyber Threat Intelligence Analyst Charity Wright about the potential ramifications of the recent tensions, and how they may impact global organizations. You’ll learn about:

    -Iranian cyber capabilities, tactics, targets, Indicators of Compromise (IoCs), and motivations
    -How to better defend against Iranian cyberattacks by identifying threats at the source
    -How to prepare your SOC and incident response teams to respond calmly and effectively to state-sponsored attacks
  • The Business Impacts of Russia’s Thriving Cybercriminal Underground Recorded: Mar 11 2020 37 mins
    Charity Wright, Cyber Threat Intelligence Advisor, IntSights
    Russian threat actors target Western organizations and governments with large-scale data breaches, malware-spreading campaigns, espionage, election meddling, and other malicious activity while the Russian government turns a blind eye.

    Listen to this webinar to learn more about:

    -The restrictive internet laws Russia imposes on businesses and consumers alike
    -The cyber-political landscape, the robust Russian cybercriminal underground community on the dark web
    -The sophisticated tools and tactics Russian hackers use to levy their attacks
  • [PANEL] Protecting the Enterprise from Threats in 2020 Recorded: Feb 13 2020 61 mins
    Jo Peterson, Tyler Cohen Wood, Carlos Valderrama, Athar Awan & Etay Maor
    2019 was the worst year to date for data breaches. Phishing, misconfiguration mistakes, third party risk, and insider threats continue to plague organizations across industry verticals. So, what are some proactive approaches organizations can take to address old and new security threats in 2020?

    Join this panel of security experts and industry leaders to learn more about:
    - The biggest threats to the enterprise in 2020
    - What keeps CISOs up at night
    - How to stay ahead of the threats
    - Proactive security strategies and best practices
    - Avoiding misconfiguration mistakes and minimizing the risk of insider threats
    - Solutions available today and what to expect in the near future

    Speakers:
    Jo Peterson, Vice President Cloud Services, Clarify360 (Moderator)
    Tyler Cohen Wood, Cyber Security Expert, Former Senior Intelligence Officer, Private Consultant
    Carlos Valderrama, SOC Director, Proficio
    Athar Awan, Cyber Security Consultant, Security Solutions Consultants
    Etay Maor , Chief Security Officer, InSights
  • CISO's Guide to Proactive Breach Mitigation Using Threat Intelligence Recorded: Feb 10 2020 40 mins
    Charity Wright, Cyber Threat Intelligence Advisor, IntSights
    Charity Wright, Cyber Threat Intelligence Advisor at IntSights will take you on a tour of the dark web and explain how CISO's can successfully implement a threat intelligence strategy to neutralize threats outside the wire and at the earliest stages of the cyber kill chain.

    Join this session to learn active measures to bolster your external cyber defense and response, including practical strategies to accelerate SecOps activities with dark web threat intelligence.
  • OSINT: The Secret Weapon in Hunting Nation-State Campaigns Recorded: Nov 15 2017 56 mins
    Alon Arvatz, Co-Founder at IntSights Cyber Intelligence
    The common notion is that state actors engaged in APT campaigns work in solitude and launch their destructive attacks in the stealthiest manner possible, rendering all pre-emptive intelligence actions against them useless. Is that what happens today? Is their way to perform reconnaissance activities and monitoring criminals on darknet and Clear Web to discover these campaigns? Discussing real use cases of state actors engaged in APT campaigns, explore what can be done with the available intelligence tools we have today, specifically from the Dark Web.

    The discussion will include real use cases of APT actors performing reconnaissance activities on darknet platforms and on the Clear Web. It will provide useful tips for organizations who wish to assess their exposure and vulnerability to such attacks by using the same reconnaissance methods as the threat actors themselves and advanced OSINT tools.

    About the presenter:

    Alon Arvatz served in an elite intelligence unit in the Israel Defense Forces. While serving for 3 years in the most innovative and operational setting, Alon led and coordinated large operations in the cyber intelligence world. Alon established Cyber School, a center providing teenagers with courses, seminars and workshops on cyber intelligence. Today, Alon is the Co-Founder & VP of Product Development at IntSights. While serving in an elite intelligence unit in the Israel Defense Forces Alon lead core cyber threats discussions investigating and deliberating main cyber topics. He also established a cyber center for teaching cyber and have a lot experience in presenting and teaching the cyber world in general and the hackers and dark and deep web in specific.
  • Dark Web Tutorial: How to Use the Dark Web to Enable Proactive Security Recorded: Jul 18 2017 64 mins
    Alon Arvatz, Co-founder & CPO
    The Dark Web is a critical resource to help security teams move from a reactive to a proactive posture. Recently, IntSights examined how dark web forums focused on recruiting and collaborating insiders. Though our findings focused on insider threats, our method highlights how examining the Dark Web has become a crucial part of implementing proactive security. In this talk, security researcher Alon Arvatz will go through:

    - Methods and techniques to uncover critical intelligence to reduce enterprise risk.
    - How to extract intelligence from Dark Web using OSINT WebINT tools and methodologies.
    - How security teams can use threat intelligence to incorporate proactive controls.

    About the speaker
    Alon Arvatz, a former IDF intelligence officer, was tasked with exploring the Dark Web to find threats to his country
  • What Every Security Professional Should Know About the Dark Web Recorded: Jun 27 2017 62 mins
    Alon Arvatz, Co-founder & CPO
    The Dark Web. A lot of scary things happen there--but it’s also a tremendously useful resource to bolster security. But you have to know how to use it and where to look. In this webinar, we’ll help security teams better leverage the Dark Web to protect the enterprise.

    Alon Arvatz, a former IDF intelligence officer, was tasked with exploring the Dark Web to find threats to his country. He’ll share his knowledge and techniques including:

    · Know where to look and what to look for in the Dark Web
    · Leverage the Dark Web to predict attacks
    · Track and identify threat actors
  • Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series] Recorded: Jun 6 2017 42 mins
    Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights
    Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?

    Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.

    About the Presenter:
    Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.
Defend Forward
IntSights is revolutionizing cybersecurity operations with the industry’s only all-in-one external threat protection platform designed to neutralize cyberattacks outside the wire. Our unique cyber reconnaissance capabilities enable continuous monitoring of an enterprise’s external digital profile across the clear, deep, and dark web to identify emerging threats and orchestrate proactive response. Tailored threat intelligence that seamlessly integrates with security infrastructure for dynamic defense has made IntSights one of the fastest-growing cybersecurity companies in the world. IntSights has offices in Amsterdam, Boston, Dallas, New York, Singapore, Tel Aviv, and Tokyo. To learn more, visit: intsights.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Hunt Threats on the Dark Web to Prevent Cyberattacks
  • Live at: Mar 24 2020 4:00 pm
  • Presented by: Liz Chernov, Sr. Cyber Intelligence Analyst, Intsights
  • From:
Your email has been sent.
or close