Navigating the Balance Between Public Information and Internal Threat Protection

Subscribers:
23,700
Published on ● Video Link: https://www.youtube.com/watch?v=KGx7IFFKS3c



Duration: 0:00
75 views
0


SANS Open-Source Intelligence Summit 2025
OSINT and Network Security: Navigating the Balance Between Public Information and Internal Threat Protection
Sanjay Poddar, Advanced Services Engineer, Fortinet

At the intermediate level, this session will discuss the strategic importance of OSINT in enhancing network security in balance with how to guard internal information. This talk will give you some tips to use OSINT to accurately detect the external threats, track the attack vectors and identify the network vulnerabilities. We will also provide examples from recent headlines to illustrate how companies can incorporate OSINT in their security strategies, and thus improve the detection and response capabilities of threat response. The session will end with practical strategies for how attendees can balance the collection and use of public data with considerations related to privacy and ethics, as well as avoid letting their broadly sensitive internal networks be exposed. What you will learn is: – Hit the balance to strengthen internal security defenses by optimizing OSINT,– Tap into monitoring public data using tools and guidance for compliance with privacy regulations whilst utilizing OSINT for safeguarding networks.

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Cyber Defense


2025-03-12Hidden in Plain Site: Leverage Commented Code and Web Metadata for Website Research
2025-03-12Tracing Code Lineage: Using OSINT to Illuminate the Origins of Open Source Software
2025-03-12Investigating Fentanyl Supply Chains: An OSINT Analysis of Chinese Biotechnology Companies
2025-03-12Chinese Social Media Intelligence
2025-03-12Mastering Email OSINT: Techniques for Uncovering Online Footprints
2025-03-12Matt Edmondson's Freestyle AI talk
2025-03-12Beyond Google Lens: How Real Estate Sites Can Assist Geolocation Efforts
2025-03-12Creating Social Network Graphs Using GEPHI
2025-03-12Social Media Discussion with the @OSINTMillennial
2025-03-12Fireside Chat with Jason Barrett
2025-03-12Navigating the Balance Between Public Information and Internal Threat Protection
2025-03-12Hunt Them Where They Play
2025-03-12Ads as Intel: Exploring ADINT's Capability to Pinpoint Personal Locations
2025-03-12Crowdsourced Intelligence: The Role of the OSINT Community in Global Investigations
2025-03-12Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth
2025-03-11Back to Basics: Keywords and Listening in
2025-03-11Finding Threat Actor Infrastructure With SSL Certificates
2025-03-11Data Processing Cheat Codes for OSINT at Scale
2025-03-11Keynote | The Power of OSINT: Navigating the New Hybrid Cold War
2025-02-09Unlock Advanced OSINT: Inside the Revamped SEC587 Course
2024-11-04Supply Chain Security Incident Response: Strategies for Responding to Emerging Threats