Using ChatGPT for Personal OPSEC
This is a recording of the Webinar on 29 March 2023.
In this webinar, we will explore the Open Source Intelligence (OSINT) and operational security (OPSEC) implications of the popular social media platform, TikTok. We will discuss the various ways in which TikTok can be used to gather data, the potential risks of using the platform, and the implications of such activities for individuals and organizations. We will also look at how organizations can use TikTok to their advantage, and the security measures they should take to ensure the safety of their data. Finally, we will provide practical tips and advice on how to use TikTok safely, and how to protect yourself and your data when using the platform. By the end of this webinar, attendees will have a better understanding of the OSINT and OPSEC implications of using TikTok and how to use the platform safely. We will also look at some of the testimony from TikTok, to Congress and cross-compare with other social media platforms.
About the Presenter
Joe Gray, a veteran of the U.S. Navy Submarine Force, is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is the Founder and Principal Instructor at The OSINTion.
As a member of the Password Inspection Agency, Joe has consistently performed well in Capture the Flag events, specifically those involving OSINT. Examples include 2nd Place in the HackFest Quebec Missing Persons CTF and Winning the TraceLabs OSINT Search Party during DEFCON 28 (as a member of The Password Inspection Agency), DEFCON 29 (as a member of The Federal Bureau of OH-SHINT), and DEFCON 30 (as a member of The Eff Ess Bees). Independently, Joe placed 4th in the DerbyCon OSINT CTF and 3rd in the National Child Protection Task Force Missing Persons CTF and 2nd Place in Hacker Jeopardy at Hack in Paris.
Joe has contributed material for a variety of platforms such as Forbes and Dark Reading in addition to his platforms. Joe has authored the OSINT tools DECEPTICON Bot and WikiLeaker in addition to the book, Practical Social Engineering, available via NoStarch Press.