Where do Cyber Threat Intelligence (CTI) and Open Source Intelligence (OSINT) rank on the priority list of IT security leaders? Which tools should they use, and what's the recommended playbook?

We asked Jake Williams, SANS instructor and president/founder of Rendition Infosec. Jake is a U.S. Army veteran and former DoD Network Exploitation operator whose expertise includes secure network design, penetration testing, and incident response.

Nick Espinoza, Head of Special Services at Authentic8, interviewed Jake about How to Use OSINT for Cyber Threat Intelligence Investigations for this short video (6 min.) in our mini-series discussing various CTI methods, tools, and techniques.

In this series, we highlight practical aspects of OSINT collection and management. They are covered in-depth by Authentic8’s 2020 Cyber Threat Intelligence Survey, which was designed to provide CTI practitioners with best practices and guidelines. Its results will be presented in a webinar on March 19th.

In this video, Nick and Jake discuss the use of OSINT for cyber threat intelligence researchers and its value for mature vs. nascent organizations.

  • What organizations benefit from formal CTI and OSINT programs?
  • What's the relevance of counterintelligence and anonymity for investigators, and how can they manage attribution when "facing" off with adversaries online?
  • What's  the "baseline toolkit" analysts and researchers should have when gathering cyber threat intelligence online?

Watch as the SANS instructor explains why in business, "nobody is too small to have some sort of CTI program."

This conversation can only scratch the surface. Mark your calendar and register here for our 1-hour webinar on March 19th, when a panel of four industry experts will discuss the CTI 2020 survey findings and how CTI professionals can leverage them.

Every attendee will receive a copy of the Cybersecurity Insider report: Cyber Threat Intelligence Survey 2020.

About the Author

A8 Team
A8 Team
Contribution Team U.S.A.

Authentic8 Team is a group of cybersecurity enthusiasts, investigation sleuths, top-notch engineers, news junkies, policy wonks and all-around fervent writers hell-bent on bringing you the best darn blog in the industry. 

Related Resources

Guide
Guide

AML: new U.S. regulation to start the year off

Congress passes defense bill with big ramifications for AML in 2021. This and other AML news and best practices from Compliance Week and Authentic8

Handbook
Handbook

Financial fraud investigation: tips & techniques

Keep your online financial fraud and AML research secure and anonymous across the open, deep and dark web

Close
Close