探花视频

探花视频, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Sayari-microsite.png
Sayari

Leveraging OSINT to Disrupt Illicit Trade


Event Date: August 28, 2024
Hosted By: Sayari & 探花视频

Even conservative estimates find that the global business of transnational crime is valued at multiple trillions of dollars annually. This illicit economy relies on formal systems of commerce and trade and the intersection between the licit and illicit presents the opportunity for interdiction. Opportunities for interdiction include stopping the movement of drugs, seizing money, or arresting a bad actor as they cross international borders. 

If we have a good understanding of the individuals, companies, vessels involved,  methods being used to transport, and the physical location of the goods being moved, we are well positioned to act against this illicit activity.

Watch this on-demand webinar, where we:

  • Highlight common illicit trade obfuscation methods
  • Demonstrate how public corporate and trade data can help identify the networks of companies and people involved in these illicit activities
  • Provide examples of using public data to uncover previously unknown illicit activity

Fill out the form below to view this archived event.


Resources


3 Tips to Boost Government Endpoint Protection
Resources

3 Tips to Boost Government Endpoint Protection

With today鈥檚 constantly expanding remote or hybrid work environments, it鈥檚 increasingly difficult to stay on top of all the cyber threats and security challenges. Having employees access systems on their personal devices, from home networks or shared networks, can leave that system vulnerable to cyberattacks. During FCW鈥檚 recent webcast, 鈥淓xploring Endpoint Protection,鈥 sponsored by Tanium and 探花视频, two cybersecurity experts addressed these risks, the challenges federal agencies face and ways to protect securities from malicious attackers. Here are some takeaways from that webcast.