Overview

November 3

Watch Now

Information security teams are responsible for detecting, analyzing and defending against malign influence and outside interference from foreign bad actors. But most of their current analytic frameworks are oversimplified. To keep up with the evolving threat of influence operations, security teams must monitor emerging tactics and develop effective countermeasures.

The Diamond Model for Influence Operations is a method for researchers and cybersecurity analysts to identify, track, analyze and report on malign influence operations. With this model, analysts can discover what malign information is being spread, how it is disseminated, for what purpose, and which influence actors are behind each operation, enabling faster defense and more informed security decisions.

Join us for a webinar on November 3 at 1 pm EST/10 am PST to learn how governments can prepare for and protect against malign influence operations. During this interactive webcast, you will:

  • Hear case studies from state-sponsored malign influence operations in China and Russia
  • See a demonstration on how to analyze real-world influence campaigns are using the Diamond Model for Influence Operations
  • Learn how your own organization can benefit from better strategies to identify and contain malign influence campaigns

Speakers

Deborah A. Snyder headshot

Deborah A. Snyder — Moderator

Senior Fellow, Center for Digital Government

Deborah is an accomplished C-level executive, influencer and educator who has dedicated her career to improving state and local government services for the citizens of New York state through policy and technology innovation. She has a broad range of experience in government, policy, cybersecurity, privacy and information technology. She recently retired from the position of New York state’s chief information security officer, where she led the state’s cybersecurity programs and directed the NYS Cyber Command Center. She works with organizations and universities to strengthen cybersecurity defenses and preparedness, and to create and inspire the next generation of cyber leaders.

Charity Wright headshot

Charity Wright — Speaker

Expert Threat Intelligence Analyst, Recorded Future

Charity Wright is a threat intelligence analyst with over fifteen years of experience in the US Army and the National Security Agency, where she served as a Chinese Linguist and Intelligence Analyst. She has been analyzing cyber threats in the private sector since 2015, with a focus on Chinese state-sponsored threats and dark web cybercrime. Charity now researches Chinese state-sponsored threats, influence operations, and strategic intelligence at Recorded Future.