Price of Our Stolen Identities on the Dark Web

Summary

This BrightTALK InfoSec session, presented by CISO Alex Holden, explores the dark web landscape and how attackers exploit stolen data to target systems. The session focuses on understanding threat actor techniques, identifying corporate data on the dark web, and learning how to protect exploited identities.

IFF Assessment

FRIEND

The article focuses on defensive strategies and understanding attacker techniques, which benefits defenders.

Severity

4.0 Medium (AI Estimated)

Defender Context

Understanding the dark web landscape and the price of stolen identities allows defenders to proactively monitor for compromised credentials and data leaks. This information can be used to improve identity and access management, implement stronger authentication mechanisms, and enhance incident response capabilities. Defenders should monitor for leaked credentials and compromised data related to their organization and users, and stay up to date on attacker TTPs.

Read Full Story →