OSINT: Not Just Offensive - SANS Blue Team Summit

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=qkItelFGblw



Duration: 31:34
7,836 views
157


Speaker: David Mashburn, Certified Instructor, SANS Institute

Open source intelligence (OSINT) is often considered an offensive tactic, as attackers seek to leverage publicly available information to tailor attacks to a specific environment. However, savvy defenders can use OSINT techniques and data to enhance security operations. We’ll dig into some specifics for using open source intel as a defensive tool.

SANS Summit schedule: http://www.sans.org/u/DuS

The Blue Team Summit features presentations and panel discussions covering actionable techniques, new tools, and innovative methods that help cyber defenders improve their ability to prevent and detect attacks.




Other Videos By SANS Institute


2019-08-13What you need to know about SEC503: Intrusion Detection In-Depth
2019-08-12What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
2019-07-31Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
2019-05-28Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
2019-05-27Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
Blue Team
SANS Summits
cyber defense