Digital Disguises for Cyber Operations

How cyber red teams hide their identities and avoid detection when performing their missions

Cyber investigators need to protect their online identity to assure a successful mission and for their own security. A growing number of options are available for masking and managing digital identities, which allow you to keep your cover when working online.

Presented by security research expert David Vaughn and Tom Badders, Senior Product Manager, Telos Corporation, Digital Disguises for Cyber Operations will provide an overview of emerging techniques that today’s red teams, threat hunters, and other cyber professionals use to conduct their operations with security and confidence.

Attendees will learn:

• The differences between non-attribution, mis-attribution, and managed attribution
• How non-attribution hosts work – and why they aren’t enough today to keep you safe
• Network obfuscation techniques for managing and disguising your online identity
• A look at tools of the trade for safe and effective red-team investigations
• The key red flags for threat hunters – and how to mask them.

Why attend?


Protecting the identity of your red teams is essential for an effective and realistic exercise. For cyber investigators, it prevents compromising the security and even the safety of real-world personnel.

In this webinar, you’ll learn why the methods you may be using now can’t keep up with today’s digital fingerprinting and network detection techniques. You’ll gain greater insights into the emerging technologies in this field and come away with knowledge you can share with your colleagues to keep your cyber operations safe, secure, and successful.