Cybercrime , Cybersecurity , Cyberwarfare / Nation-state attacks

OSINT: The Promise for Investigators

Cyber Expert John Walker on How to Leverage Open Source Intelligence
John Walker, former investigator, Royal Air Force Security/Investigations and Counter Intelligence Operations

We know that cybercriminals and even nation-states are taking advantage of the clues we leave behind in our digital footprints. How can investigators and researchers take advantage of this same open source intelligence for a positive outcome? Former U.K. Royal Air Force investigator John Walker discusses the perils and promise of OSINT.

See Also: Solving Third-Party Cybersecurity Risk - A Data-Driven Approach

In a video interview at Information Security Media Group's recent Security Summit: London, Walker discusses:

  • The nature of open source intelligence;
  • How it is currently being leveraged by police investigators;
  • The promise of OSINT in other use cases.

Walker is a visiting professor at the School of Science and Technology at Nottingham Trent University. He is on the advisory board of the Research Center in Cyber Security, University of Kent, and formerly was an investigator at the Royal Air Force Security/Investigations and Counter Intelligence Operations.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.