Persona
Threat
Hunt
Take a deep look at key management personnel from an attacker’s perspective and develop a mitigation strategy.

Look through open-source data feeds to locate as much personally identifying information as possible…

Dark web and account breach databases

Social media and traditional media

Building permits and legal databases
