Hi [[ session.user.profile.firstName ]]

Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI

The report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web.
Recorded Mar 26 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
Presentation preview: Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Dark Web over Dark Beers Recorded: May 27 2020 102 mins
    Former White House National Security CISO and CIA Cyber Security Officer, Matt Ashburn;
    Authentic8 and the Association of Certified Financial Crime Specialists (ACFCS) host an educational deep-dive into the Dark Web over Dark Beers! Authentic8’s Special Services team and Chainalysis Head of Research will take you through:
    - Navigating a financial dark web investigation
    - OSINT tools for investigating cryptocurrency
    - Case study connecting scams with blockchain analysis
    - Using Pastebin for fraud research
    - Types of fraud that have increased as a result of the pandemic
    - Techniques for tackling the impact of COVID-19’s work from home restrictions

    Meet the Presenters:
    - Former White House National Security CISO and CIA Cyber Security Officer, Matt Ashburn; National Security Engagement Lead, Authentic8
    - Head of Research, Kimberly Grauer, Chainanalysis Inc.
    - Award-winning financial crime analyst, Nicholas Finnberg, OSINT training specialist, Authentic8
    - 20 year veteran of IT and security solutions, Mike Burwick, Director of Sales Engineering, Authentic8
    - Author and Event host Brian Kindle, VP Product Development, Association of Certified Financial Crime Specialists (ACFCS)
  • Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI Recorded: May 13 2020 45 mins
    SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
    The Cyber Threat Intelligence in 2020 report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web. Consumers and producers of threat intelligence should watch the webinar to:
    - Access building blocks for improving operational security and collaborative efficiency on CTI teams
    - Understand how organizations prepare their researchers to explore the web
    - Unearth the lack of oversight researchers have when investigating the dark corners of the internet

    Learn from our panelists:
    - SANS Institute's Jake Williams (@malwarejake) brings experience and insight by diving into the results from the mindset of the attacker. Jake has over a decade of experience in secure network design, penetration testing, incident response, forensics, and malware reverse engineering.
    - Paypal's Sr. MTS Security Architect, Marty Jorgensen. Marty delivers insight gained from the 17 years of experience supporting PayPal's tremendous growth.
    - Google's Customer Engineer, Jhilam Biswas, reflects her hands-on experience and deep subject matter expertise in the areas of cloud security, regulatory compliance, and industry standards.
    - Cybersecurity Insiders CEO, Holger Schulze brings his perspective as CEO of a 400,000-member online community of InfoSec professionals.
    - Authentic8's Head of Platform, Sean Herigate shares multiple use cases from leading the Navy's cyber defense operations and helping create the DoD's innovation unit in Silicon Valley.
  • Why Cyber Threat Intel Researchers Need Dark Web Access Recorded: May 5 2020 7 mins
    SANS Analyst and Rendition Infosec founder, Jake Williams, and Head of Special Services at Authentic8, Nick Espinoza
    In the interview "Why CTI Researchers Need Dark Web Access," SANS Analyst and Rendition Infosec founder, Jake Williams, and Head of Special Services at Authentic8, Nick Espinoza, discuss various data sets in the open, deep, and dark web that help researchers. Jake and Nick talk about where on the internet, CTI researchers can find high-value data while staying secure and anonymous. Both refer to a 2020 survey taken by 338 cyber threat intelligence practitioners about the platforms, processes, and solutions used by them in the collection and management of OSINT related information. View the results in the Webinar "Cyber Threat Intelligence Report 2020," also published on Authentic8's BrightTALK channel.
  • Extending the Zero Trust Framework to Unmanaged Devices Recorded: Apr 29 2020 61 mins
    Chase Cunningham, Forrester Research, Inc. & Ramesh Rajagopal, Authentic8 Co-Founder & President
    Remote workers need to reach your applications from anywhere, on any device. How do you enable access while also safeguarding the delivery and interaction with your sensitive data?
    Forrester VP and Principal Analyst Chase Cunningham and Ramesh Rajagopal, Authentic8's Co-Founder and President, will offer practical suggestions for implementing a Zero Trust framework, in the context of unmanaged devices.
    Join us to learn:
    •How organizations can use Zero Trust to solve security challenges beyond authentication and access
    •What types of risks exist in the age of unmanaged and remote / contractor workforce
    •How can Zero Trust thinking help mitigate these risks
  • The Next Evolution of Cyber Threat Intelligence (CTI) Recorded: Apr 1 2020 9 mins
    SANS Analyst and Rendition Infosec founder, Jake Williams, and Head of Special Services at Authentic8, Nick Espinoza
    In the interview "The Next Evolution of Cyber Threat Intelligence," SANS Analyst and Rendition Infosec founder, Jake Williams, and Head of Special Services at Authentic8, Nick Espinoza, discuss the future of investigation platforms, data collectors, machine learning and regulations of how to handle data. Jake and Nick ponder future remedies to current cyber threat intelligence and challenges.

    Both refer to a 2020 survey taken by 338 CTI practitioners about the platforms, processes, and solutions used by them in the collection and management of OSINT related information. View the results of that survey in the Webinar "Cyber Threat Intelligence Report 2020," also published on Authentic8's BrightTALK channel.
  • Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI Recorded: Mar 26 2020 45 mins
    SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
    The report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web.
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations Recorded: Feb 20 2020 7 mins
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss the use of OSINT for cyber threat intelligence researchers and its value for mature vs. nascent organizations.

    - What organizations benefit from formal CTI and OSINT programs?
    - What's the relevance of counterintelligence and anonymity for investigators, and how can they manage attribution when "facing" off with adversaries online?
    - What's the "baseline toolkit" analysts and researchers should have when gathering cyber threat intelligence online?

    You'll also receive instructions on how to participate in the CTI 2020 Survey.

    Watch as the SANS instructor explains why in business, "nobody is too small to have some sort of CTI program."
  • Conducting Social Media Investigations Without Exposing Yourself Recorded: Jul 16 2019 25 mins
    Nicholas Finnberg and Claudia Berth
    In today’s cyber world, social media has become an extremely powerful research tool for investigators. As of January 2019, there are over 3.5 billion active social media users across the world and growing at a rate of 200 million new accounts per year. Investigators need a safe method to access and capture that data.
  • Your Browser Betrays You Recorded: Apr 25 2019 45 mins
    Mark Sarbiewski and John Klassen
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • New Release of Silo: Overview and Demo Recorded: Mar 14 2019 37 mins
    Mark Sarbiewski and Alfredo Cardenas
    In this webinar, we’ll cover all the key enhancements in the new Silo release, including branding and personalization, and you’ll learn how your users and administrators can take full advantage of them. We will make sure to leave time at the end of the webinar to answer questions.
  • Who’s using a Cloud Browser today? YOU’D BE SURPRISED. Recorded: Jan 29 2019 10 mins
    John Klassen, Product Marketing, Authentic8
    Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource your risk and increase your control over the web.
  • Maintaining a Quality AML Program 2.0 Recorded: Aug 29 2018 35 mins
    Kevin Sullivan and Authentic8
    Kevin Sullivan spent 22 years in law enforcement before retiring from the NY State Police. He was the New York State money laundering coordinator at The NY HIFCA (High Intensity Financial Crimes Area) El Dorado Task Force at the NY HIDTA (High Intensity Drug Trafficking Area. This is the largest money laundering task force in the world.

    In this webinar, Kevin will discuss how organizations can maintain a quality AML program.
Enable anyone, anywhere to experience the web without risk.
View our webinars to learn how the world’s most at-risk organizations access and research the open, deep and dark web remotely and without risk.

The Silo Web Isolation Platform separates the things you care about like apps, data, and devices, from the things you cannot trust like external websites, users and unmanaged devices. Silo executes all web code in a secure, isolated environment that is managed by policy, to provide protection and oversight.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI
  • Live at: Mar 26 2020 6:00 pm
  • Presented by: SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
  • From:
Your email has been sent.
or close