The Cyber5 Podcast

Moving OSINT Data to Intelligence with Nisos Director of Threat Investigations Michael Eller

Episode 14 of the podcast covers techniques and tradecraft of open source intelligence and investigations. How these investigations can help businesses and executives avoid online crimes and where automation plays a helping hand with Mike Eller, Director of Threat Investigations at Nisos.
Outline:

  • (00:44) Intro
  • (02:51) Question 1: What is the difference between a cyber threat intelligence analyst and an OSINT investigator?
  • (04:22) Question 2: What are some general skillsets you need to be a good online investigator and what kinds of security problems do you solve?
  • (09:50) Questions 3: Many people don’t know where to start when they are being scammed, extorted, or hacked. What are the methodologies you’d like to spread to level the playing field? Examples?
  • (13:57) Questions 4: What can executives know about removing PII from the internet to protect themselves from physical and cyber attacks?
  • (16:50) Question 5: What kinds of interesting datasets are out there in this profession? Where is automation helpful?
  • (23:39) Closing

Episode 14 | July 24, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks