In this session, we will address the following questions:

  • What is the dark web?
  • How is it used for criminal activities? (planning attacks, security breaches, AWS keys, ransomware extortion sites, etc)
  • Where do I start? 
  • How can I monitor my vendors for dark web credential leaks, activity, and mentions on the dark web?