Persona
Threat
Hunt
Take a deep look at key management personnel from an attacker’s perspective and develop a mitigation strategy.
![](https://bantam-tech.com/wp-content/uploads/icon-hunt.png)
Look through open-source data feeds to locate as much personally identifying information as possible…
![](https://bantam-tech.com/wp-content/uploads/icon-darkweb.png)
Dark web and account breach databases
![](https://bantam-tech.com/wp-content/uploads/icon-social.png)
Social media and traditional media
![](https://bantam-tech.com/wp-content/uploads/icon-database.png)
Building permits and legal databases
![](https://bantam-tech.com/wp-content/uploads/icon-datafeed.png)