open

How do cybercriminals interact on the web? Just as children lie to their parents, threat actors regularly seek to subvert the truth as a core aspect of their operations. Hacktivists exaggerate their capability and impact, criminals scam fellow criminals and state actors lay false trails to confuse investigators – in plain terms: lying is the norm.

Digital Shadows analysts also use Structured Analytical Techniques such as the Strengths Weaknesses Opportunities and Target analysis, paired comparison or the Analyses of Competing Hypotheses in an attempt to remove bias and focus on the evidence at hand. Join Mark Tibbs, intelligence development manager of Digital Shadows at Cyber Security Week in an exclusive press demo and discover how the extensive analyses can help you as a journalist to gain more insight cybercriminal behavior and trends that is useful for reporting on cyber threats.

Digital Shadows, recently recognized as a leader in the The Forrester Wave™, completes digital risk management with a team of data scientists and intelligence experts who gain access to closed sources, and qualify the data collected to enhance analytic capabilities, giving companies all the insights to monitor, manage and protect against threats no matter where they are coming from.

Back to Programme
Organised by
Digital Shadows
Location

HSD Campus

Wilhelmina van Pruisenweg 104

2595 AN The Hague