The Cyber5 Podcast

Digital Identity Reduction for Executive Protection

In episode 38 of the Cyber5, we are joined by Director at Nisos, Seth Arthur. Seth discusses digital identity reduction, a methodology for removing online personally identifiable information (PII).

Outline:

  • We start with a discussion on “doxxing” particularly when executives are identified by bad actors. Analyzing the threat, reviewing the digital footprint, and attributing the actor(s) are common for digital executive protection. (01:00-04:12)
  • We then discuss how PII proliferates online and what can be done to reduce online footprints every six months. (04:13-08:24)
  • Finally, when the level of a threat becomes probable to someone’s physical security, we discuss steps to attribution (08:24-11:13)

Episode 38 | January 21, 2021

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks