Evaluating and Leveraging Adversary DNS and Infrastructure OSINT

November 16, 2020 – 10:45AM EST

From ad hoc lookups to scaled programmatic enrichment via APis, there are many ways SOC teams source and use DNS focused Open Source Intelligence. In this session we’ll cover considerations and challenges with these datasets and explore new ways to put them to use in:

  • Hunting for phishing domains
  • Assessing and pivoting on adversary infrastructure
  • Threat intelligence workflow automation

Learning Objectives

  • Identify Single vs Multi-Tenant Adversary Infrastructure
  • Identify Adversary tactics, techniques, procedures in DNS OSINT
  • Discover concepts for OSINT workflows

Taylor-Wilkes Pierce

Senior Sales Engineer, DomainTools

You need to purchase your pass and register for Security Congress before you can save your spot to attend this session.

Reminder: to register for and view sessions,
all attendees must sign-up or log into BrightTALK

Trouble logging in for the session? Click here

Already have a BrightTALK account? Click “Log in”

You don’t have to use the same email address as your Congress account

Don’t have an account yet?

Fill out the form to sign up for free!


Think you have an account but forgot your password?

Or you’re seeing this message?

Click here to reset your BrightTALK password

Seeing this screen or the session is playing?

You’re already logged in!


Still having trouble?
Click here to email support

Taylor-Wilkes Pierce

Senior Sales Engineer, DomainTools