Cyber investigators need to protect their online identity to assure a successful mission and for their own security. A growing number of options are available for masking and managing digital identities, which allow you to keep your cover when working online.
In this webinar, co-sponsored by Cyber QRT and presented by security research expert David Vaughn and Tom Badders, Senior Product Manager, Telos Corporation, Digital Disguises for Cyber Operations will provide an overview of emerging techniques that today’s red teams, threat hunters, and other cyber professionals use to conduct their operations with security and confidence.
Attendees will learn:
Protecting the identity of your red teams is essential for an effective and realistic exercise. For cyber investigators, it prevents compromising the security and even the safety of real-world personnel.
In this webinar, you’ll learn why the methods you may be using now can’t keep up with today’s digital fingerprinting and network detection techniques. You’ll gain greater insights into the emerging technologies in this field and come away with knowledge you can share with your colleagues to keep your cyber operations safe, secure, and successful.
About David Vaughn:
David is a highly respected senior strategist with a proven track record of effectively understanding and communicating contextual business requirements to both technical and non-technical leadership.
He is currently a lead information security researcher for a large financial services corporation. Previously, he was a Corporate Information Security Officer with Branch Banking & Trust (BB&T), and prior to joining BB&T he served as Chief Information Security Officer (CISO) for Cyber Defense Technologies.
About Tom Badders:
Tom Badders is a Senior Product Manager at Telos Corporation, a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations. Tom’s focus is on network capabilities to protect organizations and individuals from cyber threats. He has extensive knowledge and expertise in managed attribution, obfuscation, and encryption for cloud and premise-based networks. Leveraging over 40 years of experience in systems and network integration, Tom drives the strategy and direction for the company’s cloud-based managed attribution products and services business and, in turn, provides industry leadership for the development of obfuscation technologies to help eliminate attack surfaces targeted by cyber adversaries.