InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Dark Web Revealed: How to Locate Threats on the Dark Web

Presented by

David Sygula, Head of Threat Investigations at CybelAngel

About this talk

The dark web is home to all sorts of nefarious activity. From drugs and fake identities to fraud and illegal marketplaces, there are hundreds of services for hire. This includes cyber threats like ransomware as a service, stolen data, and other cybercrimes. Threat Actors rely on companies not knowing much about the dark web to hide their activities. Join us as David Sygula, Head of Threat Investigations at CybelAngel, pulls back the curtain to reveal what the dark web is, how one finds threats, and how to best protect yourself against this mysterious world. Join our webinar to learn: How dark web forums are structured How do cyber analysts locate threats on the dark web How to best protect your company from becoming a target Join us on October 12th, 11AM CEST for our webinar “Dark Web Explained - Locating Threats on the Dark Web”.
CybelAngel

CybelAngel

1993 subscribers37 talks
Data leaks are inevitable. Damage is optional.
CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel's combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.
Related topics