How to Conduct and Utilize Human Intelligence by Engaging Your Cyber Adversaries

  • Webcast Aired Tuesday, 30 Oct 2018 1:00PM EDT (30 Oct 2018 17:00 UTC)
  • Speaker: Itay Kozuch

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. Historically, they have used a variety of different intelligence sources, including open-source intelligence (OSINT), Machine Intelligence (SIGINT) and Social Media Intelligence (SOCMINT). However, the one constant behind all attacks is that they are human-driven. As threat actors keep innovating to make their attacks more difficult to see and stop, another form of intelligence is becoming critical for cybersecurity success 'human intelligence (HUMINT). '

In this session, we'll share best practices for conducting your own HUMINT, provide uses cases for using this intelligence, and discuss some common dangers and challenges with threat actor engagement. Make sure you attend to find out how your organization can leverage Human Intelligence to make smarter cybersecurity decisions.