How to Use OSINT for Security POI Investigations
Security teams who require information about a POI will need to secure the right open-source intelligence (OSINT) sources and techniques in order to identify threats and manage risk to their organizations.
What You’ll Learn:
- Best practices for gathering, consolidating and organizing open intelligence to easily navigate through your Point of Interest (POI) investigations from start to finish.
- Step-by-step processes for performing OSINT investigations on POIs – with a deep dive into People, Organizations, and Domains.
- Tips for automating and streamlining your OSINT techniques to accelerate the velocity of your POI investigations and scale your security operations.
Papers & Reports
Applying the right investigative lens to understand the behaviour & language of threat actors across the Surface, Deep & Dark Web
Distinguish between the Surface, Deep, and Dark Web and learn the importance of Internet investigations in assessing public and private risk
Understand the Laws and Warrants that apply to Law Enforcement and Corporate Security Teams
Tips and techniques to reduce false positives and combat alert fatigue at the source
Using Internet Threat Intelligence to adapt to COVID-19 and redefine security operations
Understand the risks that Dark Web marketplaces create, and how they endanger public safety and corporate security
Case Studies & How To Guides
A private company operating hospitals, care centers, and medical practices across multiple North American cities was having a hard time combatting a high number of cybersecurity threats. Their information security team had a strong defense but were blind to threats that happened outside their system.
Understand how their team used Media Sonar and open-source data to close the external threat intelligence gap.
Whether you’re B2B or B2C, your organization and product brands are your company’s greatest assets and need to be protected. It takes years to develop public goodwill which can be seriously undermined by cyber fraud, such as brandjacking and the sale of counterfeit goods.
Learn primary OSINT sources and understand how to use OSINT to detect & investigate brand cybercrime such as brandjacking and the sale of counterfeit or stolen goods.
Security teams who require information about a POI will need to secure the right open-source intelligence (OSINT) sources and techniques in order to identify threats and manage risk to their organizations. OSINT has incredible power, but you need the right tools and data to make it actionable.
Best practices for gathering, consolidating, and organizing open intelligence to easily navigate through your Point of Interest (POI) investigations from start to finish.