Diving into the Underground: Persona Management and Threat Actor Engagement

Gain access to the sources where threat actors plan, play, and profit.

Watch Now

The dark web is filled with threat actors planning nefarious crimes. Cybersecurity professionals know that threat hunting in these underground environments is necessary, but they don’t know the most crucial step to beginning the process. ‘How do you access the deep and dark web?’ and ‘How do you gain a threat actor’s trust?’ These are the most commonly asked questions of cybersecurity professionals preparing a proactive threat hunt.

Navigating the underground requires dedication to persona management and setting up a safe and secure environment to ensure one does not expose themselves to malicious actors. Cybersixgill's Global Director of CTI, Michael-Angelo Zummo, will demonstrate how to set up a secure environment (dirty machine) using Tails, how to find sources in the dark web, best practices when creating your first persona, communicate with threat actors, and of course, how to seek out threats once you gain access to the sources where threat actors plan, play, and profit. All while using real examples that attendees can try for themselves.

Diving into the Underground thumbnail

What you'll learn

Gain practical knowledge on the tools threat actors use to remain anonymous and communicate

Identify popular sources where threat actors communicate and share malicious tools and sensitive data

Learn how to threat hunt once one has successfully infiltrated these underground sources

Meet our speaker

Michael-Angelo Zummo

Michael-Angelo Zummo

Global Director, CTI Analysts

Michael-Angelo Zummo is a Cyber Threat Intelligence Specialist at Cybersixgill. He is a US Marine Corps veteran that started his career as a cryptologic linguist and intelligence analyst. He served at the NSA (National Security Agency) where he supported national security efforts against foreign threats. Zummo earned his Masters in Cybercrime Investigations and Cybersecurity from Boston University, where he transitioned from national security to digital forensics, dark web intelligence, and law enforcement.

Access the webinar

It will be sent to your e-mail!

How can Cybersixgill’s products help your business?

Contact our experts to discover which solutions are best for your company

Book a demo

Recommended resources

Cybersecurity in Focus: Manufacturing
Ebook

Cybersecurity in Focus: Manufacturing

Get ahead of cyber threats targeting the manufacturing sector with our latest ebook.

Read now
Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance
Webinar

Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance

Apply contextual risk-based threat intelligence to enhance data security, compliance, and regulatory adherence, minimizing cybersecurity threats and assessing business risk.

Watch now
Broken Chains: Understanding Third-Party Cyber Threats
Report

Broken Chains: Understanding Third-Party Cyber Threats

Discover the nature and impact of supply chain attacks, emphasizing proactive measures for risk mitigation and enhancing supply chain security and resilience.

Read now