Hi [[ session.user.profile.firstName ]]

Your Browser Betrays You

Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
Recorded Apr 25 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Sarbiewski and John Klassen
Presentation preview: Your Browser Betrays You

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations Recorded: Feb 20 2020 7 mins
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss today's use of OSINT for Cyber Threat Intelligence (CTI). The talk addresses:

    - If Counter Intelligence (CI) depends on an organization's maturity level
    - If an organization can be too small to have a CTI program
    - Why a framework for CI is so challenging to build
    - How managed attribution is like CI on steroids
    - If it's more important to prioritize spending on CTI tools or processes

    You'll also receive instructions on how to participate in the CTI 2020 Survey. Watch the talk and join in the discussion on the magnitude of OSINT in CTI.
  • Conducting Social Media Investigations Without Exposing Yourself Recorded: Jul 16 2019 25 mins
    Nicholas Finnberg and Claudia Berth
    In today’s cyber world, social media has become an extremely powerful research tool for investigators. As of January 2019, there are over 3.5 billion active social media users across the world and growing at a rate of 200 million new accounts per year. Investigators need a safe method to access and capture that data.
  • Your Browser Betrays You Recorded: Apr 25 2019 45 mins
    Mark Sarbiewski and John Klassen
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • New Release of Silo: Overview and Demo Recorded: Mar 14 2019 37 mins
    Mark Sarbiewski and Alfredo Cardenas
    In this webinar, we’ll cover all the key enhancements in the new Silo release, including branding and personalization, and you’ll learn how your users and administrators can take full advantage of them. We will make sure to leave time at the end of the webinar to answer questions.
  • Who’s using a Cloud Browser today? YOU’D BE SURPRISED. Recorded: Jan 29 2019 10 mins
    John Klassen, Product Marketing, Authentic8
    Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource your risk and increase your control over the web.
  • Maintaining a Quality AML Program 2.0 Recorded: Aug 29 2018 35 mins
    Kevin Sullivan and Authentic8
    Kevin Sullivan spent 22 years in law enforcement before retiring from the NY State Police. He was the New York State money laundering coordinator at The NY HIFCA (High Intensity Financial Crimes Area) El Dorado Task Force at the NY HIDTA (High Intensity Drug Trafficking Area. This is the largest money laundering task force in the world.

    In this webinar, Kevin will discuss how organizations can maintain a quality AML program.
Conduct anonymous, secure and misattributed open & dark web research.
Silo Research Toolbox is a managed attribution and research application. It allows researchers to spoof their true location worldwide, manipulate their hardware and software fingerprints, and to collect, annotate, and securely store internet-based Publicly Available Information (PAI). Research Toolbox also includes OSINT tools for post-fetch language translation, link tracking, as well as web code and traffic analysis capabilities. Centralized policy management and full auditing of research activity ensure organizational compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Your Browser Betrays You
  • Live at: Apr 25 2019 5:00 pm
  • Presented by: Mark Sarbiewski and John Klassen
  • From:
Your email has been sent.
or close