Lenny Zeltser hosts a lively discussion of new ways to investigate threat actors using OSINT (Open Source Threat Intelligence) such as domain registration data, IP address data, MX records, geolocation, and more. Using examples from high-profile cybercrime cases (such as APT1 or APT28), Tim Helming from DomainTools will demonstrate how threat actors can be identified, or their webs of connected holdings can be mapped for defensive (or offensive) purposes.