Hi [[ session.user.profile.firstName ]]

Cloud-based Research Platform for Threat Hunters

Learn how to apply threat intelligence and use dark web visibility to reduce risk within your organisation.

Threat intelligence is no longer a luxury. It has become the foundation upon which a strong security posture is constructed. But where do you start?

Join Authentic8 and Recorded future to see threat hunters run Recorded Future on the Silo Research Toolbox platform to access deep and dark websites safely and securely with managed attribution.

You will:

-Get best practices and case studies for implementing threat intelligence as part of your own information security strategy

-Understand the distinction between data and intelligence

-Gain insight into the value of different intelligence gathered from sources spread across the open and dark web

-Find out how a cloud-based browser can eliminate risk and lowers costs for threat hunters
Recorded May 8 2019 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Authentic8 and Recorded Future
Presentation preview: Cloud-based Research Platform for Threat Hunters

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI Recorded: Mar 26 2020 45 mins
    SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
    The report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web.
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations Recorded: Feb 20 2020 7 mins
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss the use of OSINT for cyber threat intelligence researchers and its value for mature vs. nascent organizations.

    - What organizations benefit from formal CTI and OSINT programs?
    - What's the relevance of counterintelligence and anonymity for investigators, and how can they manage attribution when "facing" off with adversaries online?
    - What's the "baseline toolkit" analysts and researchers should have when gathering cyber threat intelligence online?

    You'll also receive instructions on how to participate in the CTI 2020 Survey.

    Watch as the SANS instructor explains why in business, "nobody is too small to have some sort of CTI program."
  • Conducting Social Media Investigations Without Exposing Yourself Recorded: Jul 16 2019 25 mins
    Nicholas Finnberg and Claudia Berth
    In today’s cyber world, social media has become an extremely powerful research tool for investigators. As of January 2019, there are over 3.5 billion active social media users across the world and growing at a rate of 200 million new accounts per year. Investigators need a safe method to access and capture that data.
  • Your Browser Betrays You Recorded: Apr 25 2019 45 mins
    Mark Sarbiewski and John Klassen
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • New Release of Silo: Overview and Demo Recorded: Mar 14 2019 37 mins
    Mark Sarbiewski and Alfredo Cardenas
    In this webinar, we’ll cover all the key enhancements in the new Silo release, including branding and personalization, and you’ll learn how your users and administrators can take full advantage of them. We will make sure to leave time at the end of the webinar to answer questions.
  • Who’s using a Cloud Browser today? YOU’D BE SURPRISED. Recorded: Jan 29 2019 10 mins
    John Klassen, Product Marketing, Authentic8
    Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource your risk and increase your control over the web.
  • Maintaining a Quality AML Program 2.0 Recorded: Aug 29 2018 35 mins
    Kevin Sullivan and Authentic8
    Kevin Sullivan spent 22 years in law enforcement before retiring from the NY State Police. He was the New York State money laundering coordinator at The NY HIFCA (High Intensity Financial Crimes Area) El Dorado Task Force at the NY HIDTA (High Intensity Drug Trafficking Area. This is the largest money laundering task force in the world.

    In this webinar, Kevin will discuss how organizations can maintain a quality AML program.
Conduct anonymous, secure and misattributed open & dark web research.
Silo Research Toolbox is a managed attribution and research application. It allows researchers to spoof their true location worldwide, manipulate their hardware and software fingerprints, and to collect, annotate, and securely store internet-based Publicly Available Information (PAI). Research Toolbox also includes OSINT tools for post-fetch language translation, link tracking, as well as web code and traffic analysis capabilities. Centralized policy management and full auditing of research activity ensure organizational compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud-based Research Platform for Threat Hunters
  • Live at: May 8 2019 12:00 pm
  • Presented by: Authentic8 and Recorded Future
  • From:
Your email has been sent.
or close