Offensive OSINT, Used Defensively

By Joe Gray

Elevator Pitch

This talk will provide an overview of how offensive OSINT can be used defensively to protect organizations and individuals. We will explore the various sources of OSINT, discuss how attackers use OSINT, & examine how to use OSINT to proactively monitor. We will also discuss OSINT tools & techniques.

Description

Abstract

This talk will provide an overview of how offensive Open Source Intelligence (OSINT) can be used defensively to protect organizations and individuals. We will explore the various sources of OSINT, discuss how attackers use OSINT to gather information, and examine how we can use OSINT to proactively monitor and protect our online presence. We will also discuss specific OSINT tools and techniques that can be used to secure our digital assets.

Outline

  • Introduction (5 minutes)
    • Definition of OSINT
    • Overview of Offensive OSINT
  • Sources of OSINT (10 minutes)
    • Social media
    • Publicly available databases
    • Search engine tools
  • How Attackers Use OSINT (10 minutes)
    • Information gathering
    • Social engineering
    • Data harvesting
  • Defensive OSINT (10 minutes)
    • Proactively monitoring online presence
    • Identifying potential threats
    • Protecting digital assets
  • OSINT Tools & Techniques (10 minutes)
    • OSINT frameworks
    • OSINT-based tools
    • OSINT automation
  • Conclusion (5 minutes)
    • Summary of key points
    • Questions and Answers
    • Next Steps