Spotlight: Operationalizing Deep Web and Dark Web Intelligence

In this episode of the podcast: Chris Camacho of Flashpoint* joins us to talk about “the deep web” and “the dark web.” Chris and I talk about how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs. 

We hear a lot of talk about the “dark web” or the “deep web” these days: shadowy nether regions of the Internet – beyond the reach of Google’s crawlers. These un-indexed and often password protected sites are where cyber criminals, terrorist groups, drug dealers, hacktivists, and nation state actors and privacy extremists congregate, chat, plot and do business.

Chris Camacho, Flashpoint
Chris Camacho is a VP of Strategy at Flashpoint.

But what is the deep and dark web, exactly? And what value does the information gathered there have to a security-conscious organization? Just as important: how can organizations that benefit from this kind of threat intelligence operationalize it to put them a step ahead of malicious actors and targeted attacks?

See also: Military documents about MQ-9 Reaper drone leaked on dark web

Those are questions we posed to our guest this week: Chris Camacho is the Chief Strategy Officer at Flashpoint. In this podcast he and I talk about what people are referring to by the deep web and dark web, how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs.

Far from being a bleeding edge service, threat intelligence is becoming a critical and even required component of mature information security programs, Camacho tells me.

Check our full conversation in our latest Security Ledger podcast at Blubrry. As always, you can also listen to it on iTunes and check us out on SoundCloud.

(*) Flashpoint is a sponsor of The Security Ledger. For more information on how Security Ledger works with its sponsors and sponsored content on Security Ledger, check out our About Security Ledger page on sponsorships and sponsor relations.

Spread the word!

Leave a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.