RSA 2015 Session: Online Counterintelligence — Leveraging Web Logs to Gather Intelligence
Have you ever wished that you were a fly on the wall in your competitor’s conference rooms? It turns out that it is often possible to learn a great deal about their plans and activities simply by monitoring your own web logs. Visitors to your website are revealing much more information than they may have intended.
Competitors are visiting your website to learn as much as they can about your business and products. There is not much you can do about that because the site is by necessity public. Fortunately, in the process they are revealing all kinds of information about themselves, information which is not at all public. You can learn what new products they may be developing, where they are in the development process, and even if you are a target for a possible acquisition.
At the upcoming RSA conference, my session talk will go into detail about the specifics of a successful website counterintelligence strategy. We will discuss the value within web logs, and outline the steps necessary to truly leverage this potential asset.
Specifically, the presentation provides four aggressive tricks for identification: targeted social media links, phishing emails, social engineering for IP blocks and HTML bugs within email. In addition, you will walk away with a three step counterintelligence process designed to arm you with the information you need to accurately guard your organization against undesired visitors.