Staying Anonymous on the Dark Web

The dark web is often used for online investigations and research. Because you need to use the Tor browser to access dark web sites, people assume that will protect their identity. However, there are still many ways you can be exposed and have your online mission compromised if you don’t take appropriate security and misattribution measures.

Palo Alto Networks CEO Nikesh Arora and Arista Networks CEO Jayshree Ullal offer their unique blend of trend spotting and straight-shooting business observations as they discuss the opportunity and the perils organizations face as they make their journey to the cloud.

There are seven key concepts that need to be accommodated in a secure cloud architecture, and this session will break down each one to help attendees think about cloud security architecture design from a practical, repeatable perspective.Learning Objectives.

World’s Most Famous Hacker Kevin Mitnick & KnowBe4’s Stu Sjouwerman Opening Keynote:
The World’s Most Famous Hacker Kevin Mitnick & KnowBe4 CEO Stu Sjouwerman Deliver the Cyber Investing Summit 2017 Opening Keynote Presentation

The dark web is often used for online investigations and research. You need to use the Tor browser to access dark web sites, people assume that will protect their identity. However, there are still many ways you can be exposed and have your online mission compromised.

The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).

World’s Most Famous Hacker Kevin Mitnick & KnowBe4’s Stu Sjouwerman Opening Keynote:
The World’s Most Famous Hacker Kevin Mitnick & KnowBe4 CEO Stu Sjouwerman Deliver the Cyber Investing Summit 2017 Opening Keynote Presentation

en_USEnglish