How to turn open-source intelligence into actionable cybersecurity insights
For our second webinar of 2025 we are going to be discussing the using OSINT and CTI for Threat Detection.
What are these we hear you say!? Read on and sign up!
——
Join us on Wednesday March 26th – 4pm UK time
Who is this for?
- Anyone in a business or organisation who has responsibility for online security.
- CTOs or senior managers who want to understand these key threats
- IT / Cyber Security teams
What we will cover:
- OSINT in Cyber Threat Intelligence (CTI)
- Why Structured OSINT Collection Matters
- Operationalising OSINT – The Intelligence Workflow
- Define Intelligence Requirements
- Identifying & Verifying OSINT Sources
- Collecting & Processing OSINT Data
- Validating & Acting on Intelligence
- Reporting OSINT to Security Teams
- Dark Web OSINT – The Hidden Cybercrime Marketplace
- What’s Sold on the Dark Web?
- Safe & Ethical Dark Web Monitoring
- Case Studies
- Automating OSINT & Dark Web Monitoring
- Best Practices for Integrating OSINT into Security
Photo by Gregoire Jeanneau on Unsplash