Overview
November 3
Watch Now
Information security teams are responsible for detecting, analyzing and defending against malign influence and outside interference from foreign bad actors. But most of their current analytic frameworks are oversimplified. To keep up with the evolving threat of influence operations, security teams must monitor emerging tactics and develop effective countermeasures.
The Diamond Model for Influence Operations is a method for researchers and cybersecurity analysts to identify, track, analyze and report on malign influence operations. With this model, analysts can discover what malign information is being spread, how it is disseminated, for what purpose, and which influence actors are behind each operation, enabling faster defense and more informed security decisions.
Join us for a webinar on November 3 at 1 pm EST/10 am PST to learn how governments can prepare for and protect against malign influence operations. During this interactive webcast, you will:
- Hear case studies from state-sponsored malign influence operations in China and Russia
- See a demonstration on how to analyze real-world influence campaigns are using the Diamond Model for Influence Operations
- Learn how your own organization can benefit from better strategies to identify and contain malign influence campaigns