Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate and Engage

The dark web is filled with threat actors planning nefarious crimes. Cybersecurity professionals know that threat hunting in these underground environments is necessary, but they don’t know the most crucial step to beginning the process. How do you access the deep and dark web? and How do you gain a threat actor’s trust? These are the most commonly asked questions of cybersecurity professionals preparing a proactive threat hunt.

Navigating the underground requires dedication to persona management and setting up a safe and secure environment to ensure one does not expose themselves to malicious actors. Senior Threat Intel Specialist at Cybersixgill, Edan Cohen, will demonstrate how to set up a secure environment (dirty machine) using Tails, how to find sources in the dark web, best practices when creating your first persona, communicate with threat actors, and of course, how to seek out threats once you gain access to the sources where threat actors plan, play, and profit. All while using real examples that attendees can try for themselves.

Register Today!