Flashpoint Intel

Vital Statistics


Founded In: 2010
51-200 employees
New York

Core Competencies

Deep Web, Dark Web, Intelligence, Business Risk Intelligence, Cybercrime, Open Source Analysis, Physical Security, Insider Threat Program, Brand Protection, M, A Diligence, Security Operations, Executive Protection.

Flashpoint Intel's Social Media Channels

Company Description

Flashpoint is the globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet. From bolstering cyber and physical security to detecting fraud and insider threats, Flashpoint partners with customers across the private and public sectors to help them rapidly identify threats and mitigate their most critical security risks. Flashpoint’s team of experts has tradecraft skills honed during years of operating in the most austere online environments, training in elite government and corporate environments, and building and leading intelligence programs across all sectors. Flashpoint is backed by Georgian Partners, Greycroft Partners, TechOperators, K2 Intelligence, Jump Capital, Leaders Fund, Bloomberg Beta, and Cisco Investments.

About This Webisode

Just like every other attack type, ransomware is not static. Attackers continue to evolve their tactics with new methods to deploy and execute ransomware and to kick you out of your own critical IT systems, networks, and applications. Worse yet, is your team prepared to handle the fallout should ransomware befall your organization? Attackers today quickly assess the maturity of their corporate victims’ response efforts and determine which of their post-attack techniques will compel victims to pay up. During this webisode Flashpoint’s Director of Intelligence, Christopher ‘Tophs’ Elisan, will explore many of the new tactics and techniques now in the extortionist tool belt.

Viewers will walk away with:

  • A fresh view of the 2021 ransomware landscape.
  • Flashpoint’s in-depth threat analysis of new extortion techniques.
  • Mitigation strategies you can apply to combat effective extortion techniques.

Leave a Comment