Hi [[ session.user.profile.firstName ]]

Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI

The report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web.
Recorded Mar 26 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
Presentation preview: Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Extending the Zero Trust Framework to Unmanaged Devices Apr 29 2020 6:00 pm UTC 60 mins
    Chase Cunningham, Forrester Research, Inc. & Ramesh Rajagopal, Authentic8 Co-Founder & President
    Zero Trust provides an effective framework for enforcing secure employee access to corporate data. Now users need to reach your applications from anywhere, on any device. How do you enable access while also safeguarding delivery and interaction with your sensitive data?

    In this webinar, Forrester VP and Principal Analyst Chase Cunningham will discuss why the Zero Trust security model is gaining popularity among enterprises and government agencies and offer practical suggestions for implementing a Zero Trust framework, in the context of unmanaged devices.

    Ramesh Rajagopal, Authentic8's Co-Founder and President, explains how organizations can use Zero Trust to solve security challenges beyond authentication and access to develop safe practices for delivering data to unmanaged devices.

    Wednesday, April 29
    2pm ET | 11am PT

    Join us to learn:
    • What types of risks exist in the age of unmanaged and remote / contractor workforce
    • How can Zero Trust thinking help mitigate these risks
    • Why it is important to augment data access controls with delivery and interaction controls
  • Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI Recorded: Mar 26 2020 45 mins
    SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
    The report cites a shocking lack of OSINT research training, tools, and oversight. In this webinar, subject matter experts review key results and share experience and insight into the TTP they rely on for investigations into the open, deep, and dark web.
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations Recorded: Feb 20 2020 7 mins
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss the use of OSINT for cyber threat intelligence researchers and its value for mature vs. nascent organizations.

    - What organizations benefit from formal CTI and OSINT programs?
    - What's the relevance of counterintelligence and anonymity for investigators, and how can they manage attribution when "facing" off with adversaries online?
    - What's the "baseline toolkit" analysts and researchers should have when gathering cyber threat intelligence online?

    You'll also receive instructions on how to participate in the CTI 2020 Survey.

    Watch as the SANS instructor explains why in business, "nobody is too small to have some sort of CTI program."
  • Conducting Social Media Investigations Without Exposing Yourself Recorded: Jul 16 2019 25 mins
    Nicholas Finnberg and Claudia Berth
    In today’s cyber world, social media has become an extremely powerful research tool for investigators. As of January 2019, there are over 3.5 billion active social media users across the world and growing at a rate of 200 million new accounts per year. Investigators need a safe method to access and capture that data.
  • Your Browser Betrays You Recorded: Apr 25 2019 45 mins
    Mark Sarbiewski and John Klassen
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • New Release of Silo: Overview and Demo Recorded: Mar 14 2019 37 mins
    Mark Sarbiewski and Alfredo Cardenas
    In this webinar, we’ll cover all the key enhancements in the new Silo release, including branding and personalization, and you’ll learn how your users and administrators can take full advantage of them. We will make sure to leave time at the end of the webinar to answer questions.
  • Who’s using a Cloud Browser today? YOU’D BE SURPRISED. Recorded: Jan 29 2019 10 mins
    John Klassen, Product Marketing, Authentic8
    Whether for threat intelligence, handling sensitive data, or providing safe and anonymous access to the public web, a Cloud Browser lets you outsource your risk and increase your control over the web.
  • Maintaining a Quality AML Program 2.0 Recorded: Aug 29 2018 35 mins
    Kevin Sullivan and Authentic8
    Kevin Sullivan spent 22 years in law enforcement before retiring from the NY State Police. He was the New York State money laundering coordinator at The NY HIFCA (High Intensity Financial Crimes Area) El Dorado Task Force at the NY HIDTA (High Intensity Drug Trafficking Area. This is the largest money laundering task force in the world.

    In this webinar, Kevin will discuss how organizations can maintain a quality AML program.
Enable anyone, anywhere to experience the web without risk.
View our webinars to learn how the world’s most at-risk organizations access and research the open, deep and dark web remotely and without risk.

The Silo Web Isolation Platform separates the things you care about like apps, data, and devices, from the things you cannot trust like external websites, users and unmanaged devices. Silo executes all web code in a secure, isolated environment that is managed by policy, to provide protection and oversight.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Threat Intelligence Survey 2020: Unmasking OSINT's Magnitude in CTI
  • Live at: Mar 26 2020 6:00 pm
  • Presented by: SANS, Jake Williams; PayPal, Marty Jorgensen; Google, Jhilam Biswas; Authentic8, Sean Heritage; CyberInsiders, H. Schulze
  • From:
Your email has been sent.
or close