
Cyber Security & Cyber Fraud
Keynote – Covertly Scraping Digital Shadows to Exploit Targets and Threat Actors
This session revealed how digital footprints on social media and devices—often beyond our control—can be covertly used to build profiles of threat actors. It highlighted methods and training that enable officers to quickly gather intelligence to monitor, disrupt, or apprehend suspects.