How (and Why) to Apply OSINT to Protect your Enterprise

Logo
Presented by

Etay Maor Sr. Director of Security Strategy at Cato Networks

About this talk

Cybersecurity Masterclass: Episode 1 We live in an era of oversharing. People share too much information on social networks; PDF and Excel files with sensitive data are out in the open; and devices expose their open ports and services. All this publicly available information makes room for Open-source Intelligence (OSINT) – a common tool used by threat actors to collect and identify data that may be putting your business at risk. What can you do about this? Sign up for our new master class webinar series on cybersecurity. These webinars will teach and demonstrate cybersecurity tools and best practices, as well as provide research and real-world case studies. Join Etay Maor, Sr. Director Security Strategy of Cato Networks, for the first session “What is OSINT?” You’ll get insights into: - Tips and tricks for better understanding OSINT - How to apply OSINT tools to protect users, processes, and technologies - Available (free) tools and techniques for performing OSINT - How Google Hacking, Shodan and Censys are used to collect valuable data - Why the remote workforce is at higher risk since the pandemic
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (189)
Subscribers (13400)
Cato Networks provides organizations with a cloud-based and secure global SD-WAN that replaces rigid and expensive MPLS and network security point products -- to power the digital business. Cato connects all data centers, branches, mobile users, and cloud resources into a global, optimized cloud network that is tightly secured by a cloud-based network security stack and backed by expert managed security services. Cato cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users and cloud datacenters into the WAN.