AJ Nash, Authentic8 Digital Intelligence Advocate, argues that while many cybersecurity analysts possess technical skills, they lack the training to think analytically and provide actionable intelligence. Discover why structured thinking, hypothesis testing and effective communication are crucial for cyber threat intelligence, and why AI isn't yet capable of solving these complex issues. Learn how investing in intelligence training can bridge this crucial gap and drive better decision-making in the cybersecurity industry.
AJ Nash explains the concept of 'left of Boom' beyond its military origins. He explores its relevance to cybersecurity, emphasizing the importance of proactive intelligence to prevent attacks rather than just responding to them. He highlights the need for understanding adversary operations, building cooperative relationships, and shifting from a defensive mindset to an intelligence-driven security approach.
AJ Nash demonstrates how to set up anonymous online research session to avoid tracking and simulate local access from other countries. He guides you through setting up an ISP to appear as if you're browsing from Serbia using a Mac and Safari. He also shows you how to access and interpret local content as part of your research. Learn how quick and easy it is to obfuscate your location for security and accurate research.