Keven Hendricks is the founder of the Ubivis Project - StopDarkwebDrugs.com. Serving in law enforcement since 2007, Keven has been on the front line of combating cybercrime since 2014, being a member of an Internet Crimes Against Children FBI Task Force from 2014 to 2018, and a member of a DEA cybercrimes Task Force from 2018 to 2021. He is a published author with the FBI Law Enforcement Bulletin on VoIP investigations as well as an instructor on dark web and cyber crimes for Street Cop Training and Federal Resources. He is an 3CE and 3CI by the NW3C, CCI through the Blockchain Intelligence Group. a member of the HTCIA (High Tech Crimes Investigator Association), a member of the United States Secret Service NYNJ Cyber Fraud Task Force, and is recognized as a Subject Matter Expert in the field through the CSIAC.
FEATURED EPISODES:
What Law Enforcement Can Do to Stop Fraud on the Dark Web
Woody Groton is Chief Information Officer of Draper and Brigade Commander. He is a technology leader with over 25 years of experience in the U.S. military, federal government, non-profit organizations, and the private sector.
FEATURED EPISODES:
How Relationship Building Helps With Cybersecurity Leadership
Kevin Burns is the Chief Information Security Officer of Draper. He is responsible for information security regarding enterprise-level environments including large scale enterprise deployments, procurement, and advanced security controls and solutions for Draper. Further, ensuring that Draper maintains compliance with federal and state regulations relative to NIST and Defense Industrial Base standards.
FEATURED EPISODES:
How Relationship Building Helps With Cybersecurity Leadership
Dov Lerner is Cybersixgill's security research lead. His focus is on malware and fraud on the dark web, and he is constantly seeking new ways to extract actionable intel from the cyber underground. He served in the military as an intelligence officer, and subsequently worked as a malware analyst. He holds the CISSP and CISM certifications and an MA in Security Studies from Tel Aviv University.
FEATURED EPISODES:
What’s the Future of Threat Intelligence?
Automatically gain access to remediation information for each vulnerability directly from NVD, MITRE and other vendor sites.
Receive a full intelligence picture of the vulnerability, complete with context – including a comprehensive audit trail of the data we have collected on the actors and their discourse, exploit kits, attribution to malware, APT and ransomware. This includes a score of the likelihood a vulnerability will be exploited over the next 90 days, hours after the CVE is first published. Unlike CVSS, this score is continually updated in real-time in response to the threat intelligence we gather.
Map vulnerabilities to MITRE ATT&CK framework to anticipate how, when or why criminals will exploit each vulnerability, listing the CVEs used in the context of each technique to assess the risk to your organization and prioritize remediation efforts.
Accurately match organizational CPEs identified in step 1 to specific, related vulnerabilities (CVEs) to determine which vulnerabilities are exposing your systems to attack.
Discover and scope the relevant organizational assets (ie. CPEs) and vulnerabilities (ie CVEs) or identify specific CPEs and CVEs that are of interest.