Overview

November 8

Watch Now

Every day, cybercriminals are conducting reconnaissance on open source intelligence (OSINT) — or information that is publicly available on the internet — about your agency and the individuals in it. They’re combing through websites, IP addresses, social media accounts, digital files like photos and videos, geospatial information and more to gather information about their target and identify their weaknesses.

It’s the first — and arguably the most critical — in a series of phases to successfully launch a cyber attack. But if government agencies can understand their vulnerabilities when it comes to OSINT, they can preempt cybercriminals from completing this foundational element of a cyberattack. 

Join Government Technology and Fortinet on November 8 at 11 am CT/12 pm ET as we break down the elements of OSINT and provide practical advice for how you can identify your vulnerabilities and the tools and resources that are available to help you do it.

Speakers

 

Hassan El-Masri

Security Strategist, Fortinet

Hassan El-Masri is a Security Strategist who has over 20 years of information technology, vast knowledge in many areas of networking, cybersecurity traversing several industries, including a specialization in security research, identity access management, and deception technologies. Mr. El-Masri has extensive experience designing solutions for complex information security problems. In 2016 Mr. El-Masri established ZOINIA, a nonprofit organization, to enable artists to use media and technology in an educational program promoting art, music, and short film documentaries to affect social change.

 

Deb Snyder — Moderator

Senior Fellow, Center for Digital Government

Deborah is an accomplished C-level influencer, with a broad range of experience in government, policy, cybersecurity, privacy and information technology. An experienced and highly respected thought leader who has held executive roles for over two decades. She recently retired from her position as New York state’s chief information security officer (CISO) after over 35 years of public service. In that role, as part of New York state’s information technology transformation and consolidation initiative, she helped redesign how the state protects its data. As state CISO, she directed the state’s comprehensive cybersecurity governance, risk management and compliance program, providing strategic leadership and vision, and assuring business-aligned, risk-based investments that maximized business opportunity and minimized cybersecurity risk. She also directed the NYS Cyber Command Center, hotline, procedures for reporting and response to cyberthreats, and digital forensics.