Black Market LIVE!

Happening in a City Near You

Cybercriminals have built a very profitable business.

From credit card data to counterfeit passports, just about anything is available for the right price on the Dark Web. For three months, Armor’s Threat Resistance Unit researchers pulled data from dozens of underground markets and forums to offer a look at how the market for cybercriminals’ goods and services continues to thrive.

Join Corey Milligan, Senior Threat Intel Analyst in Armor's Threat Resistance Unit, for an informative and interactive session you and your team do not want to miss. You will learn:

  • How cybercrime-as-a-service has shaped the threat landscape
  • The prices for stolen credit cards and bank information
  • The sale of malware, exploits, code-signing certificates and more
  • Why your social media accounts and airline rewards points are valuable to hackers
  • How hackers profit from identity theft and the sale of false documents

Tour dates and locations:

Aug. 16: Dallas, TX 11:30am-1pm at Ocean Prime
Aug. 21: Atlanta, GA 11:30am-1pm at The Palm Atlanta
Aug. 22: New York, NY 5:30pm-7pm at Fine and Rare
Aug. 28: Chicago, IL 11:30am-1pm at Little Goat
Aug. 29: Denver, CO 5:30pm-7pm at The Kitchen
Sept. 12: Your desk at 1:00pm CT! Live Streaming via Facebook, Twitter, Periscope, and YouTube


In-person event attendance includes free food, drink and SWAG! 
  • 11:30 a.m. - 1:00 p.m. events include a full lunch.
  • 5:30 p.m. - 7:00 p.m. events include heavy hors d'oeuvres and drinks.
Each location features a different Armor technology or service partner (see below).


 


Corey Milligan
Senior Threat Analyst at Armor

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industry's most sought-after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Resistance Unit, Corey provides threat intelligence support to the Security Operations Center (SOC) and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.




Special thanks to our valued partners:

microsoft_PNG6.png







Register Now for Black Market LIVE!