Intel471-Logo-white.png
Resources

Webinars On-Demand

Webinar-listing-thumbnail.png

Know Your Adversaries and Where They Trade, To Stop Cyber Attacks Aug. 2023

In this webinar we will show you how tracking adversaries and the tools they use can help you stay ahead of threats like ransomware and third party risk. We will demonstrate this using real world exam

Webinar-listing-thumbnail.png

Busting a Myth: Overlap Between Nation State & Financially Motivated Cybercrime

In this webinar, you'll discover the undeniable link between Nation-State and Financially Motivated cybercrime.

Webinar-listing-thumbnail.png

Using Intel 471 Intelligence to Prevent Ransomware Attacks

This webinar looks into the cyber underground and shows how you can identify precursors for a ransomware attack to orient your defenses and stay one step ahead of your adversaries.

Webinar-listing-thumbnail.png

7 Habits of Cybercriminals

This webinar presents the results of an analysis of more than 12 years of tracking and reporting on a variety of actors and groups in the cyber underground, which allowed us to identify seven specific

Webinar-listing-thumbnail.png

Bottom Feeders: Initial Access Broker Activity Examined

Learn about initial access offerings in the cyber underground and gain insights into the activity patterns of the most prominent IABs.

Webinar-listing-thumbnail.png

Four Ways the Cyber Underground is like the Middle Ages

In many ways, the cyber underground strongly resembles Medieval Italy or the Wild West. This webinar discusses how to increase your cyber protection by learning from history.

Webinar-listing-thumbnail.png

How a CTI Framework Catapults Your Cyber Security Program

Join us for a discussion on how to build the right CTI Framework, fueled by General Intelligence Requirements (GIRs), to help you elevate your cyber defense and catapult your cybersecurity program to

Webinar-listing-thumbnail.png

Ransomware: Attackers vs Defenders

Join us as our presenters use Intel 471's knowledge of the underground and Unit 42's experience with ransomware incident response cases to reveal how threat actors find their victims, gain e

Webinar-listing-thumbnail.png

Ransomware Dramas Why Focusing On Ransomware Itself is Not Enough

In this session, we look at the ecosystem that aids in the deployment of ransomware as well as the key actors and steps involved in a typical attack

Webinar-listing-thumbnail.png

Sidestepping a Cyber Car Crash in Matrix Time

Ransomware is like a slow-moving car crash. Incidents don't occur in an instant. The cyber underground is ripe with indicators that can predict an attack weeks or months before the event occurs.

Webinar-listing-thumbnail.png

Using A Data Driven Approach to Defend Against Cyber Threats

Learn from CLEAR, Intel 471, and ThreatQuotient professionals, who share their tactical and strategic experience regarding how cybersecurity professionals have successfully addressed similar challenge

Webinar-listing-thumbnail.png

AI: Ready for Underground Prime Time? July 2023

Ever since the introduction of ChatGPT, Artificial Intelligence (AI) has remained in the spotlight, captivating businesses and the global community as they strive to comprehend the potential of this g

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.