On-Demand Webinar- Connecting the Digital Dots: From a Single Domain to a Deceitful Operation  

How to get from a single domain to a complete fraud set
With Special Guest Case Study presented by iThreat Cyber Group


View On-Demand Now

Join Farsight Security and special guest iThreat Cyber Group for a demonstration of how iThreat’s CyberTOOLBELT platform and Farsight Security’s passive DNS data unraveled a deceitful drug rehabilitation operation starting with a single domain only and expanding it to the key individuals behind the operation and the laws they were breaking. 

Key Points Covered include:

  • An overview of the Passive DNS

  • How cybercriminals use both legitimate and malicious subdomains to gain entry

  • The steps security teams can take to uncover a single subdomain abuse and broaden that search to an entire landscape

Webinar Presenters


Daniel Schwalbe
Director Of Engineering & Deputy CISO at Farsight Security
An accomplished Information Security Professional with nearly 20 years of comprehensive experience providing solutions in Start-Up, Enterprise, and Higher Education settings. He is an active contributor to the Information Security Community, a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Privacy Professional (CIPP/US) and Certified Cyber Security Forensic Analyst (CSFA) 

Chad-1.jpgChad Los Schumacher
Team Lead Investigator, CyberTOOLBELT
Has investigated everything from the anonymous harassing email to deceptive healthcare providers to global money laundering operations through the lens of how the Internet facilitates the crime. He spent his childhood self-teaching networks and operating systems before going on to receive a B.A. in Criminal Justice from Saint Leo University and an M.S. in Intelligence Analysis from Mercyhurst University. Also, he's probably one of very few people you'll meet that still uses a BlackBerry as his personal phone by choice. 


Michael Lewis
Chief Technology Officer, CyberTOOLBELT
Has designed and implemented one of the first Rapid Application Development (RAD) systems with Dravac and was the chief designer and project leader of two different operating systems for CUC for banking system applications. He designed and led teams that developed an operating system and database management system as well as the several computer languages for d/SOFT Ltd. He is the chief architect of the iThreat® intelligence platform and was the senior developer of ICG spin-off IntegriChain through 2006. He is the chief designer and leads the design and implementation teams for the CyberTOOLBELT® intelligence platform.


View the On-Demand Webinar