They are out there, watching and waiting for an opportunity to strike—the bad actors who have carefully researched your organization in order to set the perfect trap using easily found public resources. Open-Source Intelligence (OSINT) can provide cybercriminals everything they need to know to perfectly target your users by gathering data on everything from password clues to tech stack details, banking/credit card accounts, social media details, and more. Emerging technologies like AI can make gathering this intelligence even easier.
Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4's SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.
In this special Cybersecurity Awareness webcast, you will learn:
• What apps and analytic techniques can help you better understand the data you're collecting
• Real-world demonstrations of how to conduct (legal!) OSINT gathering techniques the hackers are using on you
• How to deploy penetration testing exercises to map an attack surface
• How to conduct cyber investigations of your own
• And how understanding OSINT and training your users can help build your human firewall
Learn how to use the cybercriminals' best techniques before they do!
Attendees are eligible to receive 1 CPE credit.
Generously supported by:
Throughout my career—including experience in a CIO-equivalent role with the CIA—I have continually focused on ensuring unfailing, 24/7 enterprise IT security while also closely monitoring the bottom line and implementing continuous improvements to operational efficiency.
As a seasoned executive leader, I excel at partnering with C-suite management and cross-functional teams to formulate enterprise security strategy in alignment with overarching business goals. Additionally, I have built, guided and mentored numerous high-caliber, multidisciplinary teams, consistently demonstrating my capacity for leading with empathy while streamlining teams for optimal performance.
With a history of piloting large-scale restructuring efforts to ensure robust, highly secure enterprise IT infrastructures, I have triggered dramatic savings for large-scale organizations. Further, I am a fiscally savvy decision maker adept at line-by-line analysis of multimillion-dollar IT security budgets and at facilitating negotiations with key vendors to secure cost-effective resources.
Questions? Have an idea for a topic? Interested in sponsoring our web programs?