Тёмный
No video :(

Every Contact Leaves a Trace 

SANS Cyber Defense
Подписаться 21 тыс.
Просмотров 398
50% 1

The Internet now touches and intrudes on almost every aspect of our lives. There is a flood of data available that identifies individuals at our fingertips, sometimes apparent, but more often hidden. Conducting investigations in this new world has provided new opportunities as well as technical challenges, and has raised legal and ethical issues along the way. Now with the smallest piece of information, we can uncover crimes and corruption. Still, these same techniques can be used by malicious actors, authoritarian states, and even corporations for unethical and even nefarious purposes. In this presentation, Ken Westin will discuss real investigations and techniques he has used to track and unveil organized crime groups, white-collar cybercriminals, and disinformation and how these same techniques can be used against the innocent. Ken will also discuss why this Pandora's Box will continue to bring challenges to privacy, truth, and human rights and how we as a community can help to protect all three.
SANS Open-Source Intelligence Summit 2024
Every Contact Leaves a Trace
Ken Westin, Field CISO, Panther
View upcoming Summits: www.sans.org/u/DuS

Опубликовано:

 

29 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
A View From the Trenches
27:01
Просмотров 253
Is Skynet watching you already?
1:04:00
Просмотров 1 млн
Internet of Things Security | Ken Munro | TEDxDornbirn
17:08
The CISO Paradox
28:01
Просмотров 882
Breach Data Infrastructure
31:24
Просмотров 620