The dark web is still a mystery to many. We hear about seedy criminals hiding in its shadows and wonder should we shut down the dark web? What can we do to fortify cybersecurity when the dark web seems to run wild? Watch the discussion with cybersecurity experts and host Bob Stasio, senior product manager of cyber analysis with IBM i2 Safer Planet.
Several questions addressed during the discussion:
Why are deep, dark web actors so much more difficult to identify?
Can we permanently shut down the dark web? Would we want to? Why or why not?
What type of illegal activities are conducted on the deep and dark web?
What challenges does the dark web present for law enforcement agencies?
What should be the government's role in policing the dark web? What should or can private sector entities do in the dark web?
Bob Stasio is a senior product manager of cyber analysis with IBM i2 Safer Planet. Stasio brings nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency (NSA) and the commercial sector. Stasio also served on the initial staff of US Cyber Command. During the troop surge of 2007, his intelligence unit supported the detainment of more than 450 high-value targets.
Tyler Carbone is a technology entrepreneur with a business and law background. A graduate of Harvard University and the University of Virginia, Carbone cofounded and successfully sold two technology companies. He has consulted and advised a variety of clients, ranging from a Fortune 500 financial services company to local start-ups. And he currently serves as COO at Terbium Labs in Baltimore, Maryland.
Scott Dueweke formed Zebryx Consulting in 2015 to provide public and private sector clients an understanding of identities and alternative payment systems, both risks and rewards. Dueweke is an expert on identity and anonymous payments on the Internet, and he regularly advises senior leadership within financial institutions and the US government. Dueweke previously provided similar services for Agilex and, from 2006–2014, with Booz Allen Hamilton.
Michael Goedeker is an author and researcher at the front end of cyber warfare, espionage and crime, and researches academia, press and security professionals globally.
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
View all comments