Out in the Wild: How OSINT Supports Proactive Defense

Subscribers:
23,700
Published on ● Video Link: https://www.youtube.com/watch?v=Kwkpt19FBOM



Duration: 43:35
479 views
14


In the SOC, defenders are often true to their name-playing defense to manage detections, assess risk, and protect the network from an ever-evolving barrage of threats. However, attacks don't start with alerts-they start with the infrastructure that attackers set up to deliver the attack. Proactive open-source investigations and external hunting practices can help shift your security posture from reactive to proactive.

Learn how you can use real-world attacks and open-source data to:

Identify high-risk infrastructure associated with threat actor activity
Rapidly investigate infrastructure associations to identify patterns and TTPs, and
Create profiles that you can use to hunt externally for threats relevant to your organization-moving left in attack detection by finding threats before they find you
#OSINT







Tags:
osint
osint training
osint tools
osint techniques
jackie abrams
jackie abrams cybersecurity
jackie abrams osint
jackie abrams SOC
how to use osint to defend
open source investigations
osint investigations
osint investigation techniques
proactive defense cybersecurity
proactive defense osint
open source data
open source data for proactive defense