Do you know what your attackers know?
There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization.
Download slides: https://activecountermeasures.com/presentations
00:00 – Intro
00:42 – Executive Problem Statement
02:25 – Recon You Say?
06:11 – Your Internal Friends… Sometimes
09:01 – What Does Purple Team Do, Exactly?
10:13 – There Are A Ton Of Sources Out Here
49:55 – And Now For Some Crappy Code
Learn how to monitor cloud services for your organizations’ data being dumped on the web, account compromises, and source code disclosure.
Use external services to keep an eye on your external landscape to alert on unexpected changes.
See configurations of operational awareness uncover potential attacker’s methodology and infrastructure to provide you an upper-hand in stopping threats before they escalate.
See how an attacker utilizes common internet sources to gather intelligence about your technology stack, your perimeter security, your wireless networks, and plan attacks against your organization.
Know what your attacker knows.
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.