ASK Integrity Solutions’s Assaf Kipnis on Standing Up to Adversaries with Better Threat Intelligence
Listen now
Description
In this week's episode of the Future of Cyber Risk podcast, David speaks to Assaf Kipnis, Owner and Head Consultant/Advisor at ASK Integrity Solutions, which conducts adversarial network analysis, risk assessment, and counter-threat intel. They discuss the day-to-day activities of threat intelligence and hunting down adversaries, what adversary accounts typically look like on social media, and how digging deeper into those accounts can reveal connections leading to large-scale takedowns. They also discuss common scams prevalent today, how everyday people can keep themselves safe online, and what organizations can do to improve their threat intelligence. Topics discussed: The day-to-day efforts and expectations around threat hunting, and why once you find an adversary you should monitor them to learn from them. How to dig deeper into adversary accounts to connect the dots and take down networks at scale. What fake accounts typically look like on social media sites, and the scams they're typically perpetuating. The types of scams big organizations are performing, including one called "pig butchering," and why it's not just a certain segment of the population that falls for these. What everyday people can look out for to keep themselves safe online, including not taking financial advice from someone they don't know. Advice for organizations on how to perform better threat intelligence, including why you should reassess your metrics and goals.
More Episodes
In our latest episode of the Future of Threat Intelligence podcast, David speaks with Gregory Van den Top, AI Practice Leader for Europe at Marsh. They explore the critical importance of understanding cyber risk as an integral part of business strategy, rather than a technical...
Published 10/31/24
In our latest episode of the Future of Threat Intelligence podcast, David Bianco, Staff Security Strategist at Splunk, shares his insights on the evolving landscape of threat hunting. He introduces the PEAK threat hunting framework, emphasizing its role in enhancing security measures.  David...
Published 10/24/24
Published 10/24/24