The Cyber5 Podcast

The Evolution of Disinformation in the US and UK with Researcher Samantha Northe

Episode 21 of the podcast covers the role disinformation plays in the United Kingdom compared to the United States, and the rising threat of disinformation to the enterprise with Samantha North, PhD Candidate.

Outline:

  • (02:37) Question 1: Provide us some background on your research and academic work.
  • (03:57) Question 2: How has this research helped you conduct your threat intelligence research?
  • (08:39) Question 3: Can you give us some examples where disinformation has influenced the Brexit narrative and are there more similarities or differences to the influences disinformation has played in the political narrative in the United States.
  • (16:06) Question 4: Where do you see the future of disinformation going both on the political landscape as well as the enterprise landscape?
  • (19:32) Question 5: What should countries and even businesses be doing to combat disinformation?
  • (23:43) Bonus Question: Does attribution matter in disinformation campaigns?

Episode 21 | August 27, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks