All Episodes

June 10, 2025 29 mins

The digital world is full of breadcrumbs that tell our stories - are you carefully tracking who follows them back to you? In this eye-opening conversation with OSINT expert Ritu Gill, we pull back the curtain on the fascinating world of Open Source Intelligence and why proper tool vetting matters more than you might think.

Drawing from her 18 years in Canadian law enforcement and extensive consulting experience, Ritu reveals why careless tool selection could mean someone is "capturing every keystroke" as you conduct investigations. Her practical advice for both beginners and experienced practitioners cuts through the noise in an increasingly crowded OSINT landscape.

"Without analyzing and adding value to the information, it is not intelligence," Ritu explains, highlighting the crucial distinction between collecting data and producing actionable intelligence. Her emphasis on ethical considerations - the principle of "OSINT for good" - serves as a timely reminder that with great investigative power comes great responsibility.

Whether you're looking to build your skills through free resources like Sophia Santos' exercises, gamified platforms like GeoGuessr, or real-world missing persons cases with TraceLabs, this episode provides concrete pathways for growth. Networking emerges as a powerful career accelerator, with events like OsmosisCon offering invaluable opportunities to connect with the community.

Ready to enhance your digital intelligence capabilities while maintaining ethical standards? Follow Ritu's newsletter at forensicosint.com, explore the resources mentioned in our show notes, and join our LinkedIn community to continue the conversation. Your journey into the world of OSINT starts with understanding not just what you can find, but how to find it responsibly.


Resources:

https://www.raebaker.net

https://www.linkedin.com/in/espen-ringstad-80297464/

https://www.geoguessr.com

https://www.tracelabs.org

https://www.kasescenarios.com

https://www.forensicosint.com/newsletter

https://gralhix.com

https://osmosisinstitute.org

https://www.linkedin.com/feed/update/urn:li:activity:7317909650798977024/

Send us a text

Support the show

Thanks for tuning in! If you found this episode valuable, don’t forget to subscribe, share, and leave a review. Got thoughts or questions? Connect with us on our LinkedIn Group: Cyber Threat Intelligence Podcast—we’d love to hear from you. If you know anyone with CTI expertise that would like to be interviewed in the show, just let us know. Until next time, stay sharp and stay secure!

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Ritu Gill (00:00):
People are very quick to use any OSINT tool that
comes across their desk, andthat's where it's really
concerning, because you could becapturing every keystroke.

Rachael Tyrell (00:10):
Hello and welcome to Episode 8, season 1,
of your Cyber ThreatIntelligence Podcast.
Whether you're a seasoned CTIexpert, a cybersecurity
professional or simply curiousabout the digital battlefield,
our expert guests and hosts willbreak down complex topics into
actionable insights.
On this episode of Season 1,our host, pedro Kurtzman, break
down complex topics intoactionable insights.
On this episode of Season 1,our host, pedro Kurtzman, will
chat with Ritu Gill, who is anopen-source intelligence analyst

(00:31):
with 18 years of experienceworking with Canadian law
enforcement.
After serving 12 years with theRoyal Canadian Mounted Police,
ritu launched a consultingbusiness specializing in OSINT
training and research for lawenforcement and related
organizations across NorthAmerica.
Ritu is also the president ofOsmosis, an organization
dedicated to standardizing OSINTpractices and connecting

(00:51):
professionals in the field.
Ritu holds a bachelor's degreein criminology and remains an
active member of the OSINTcommunity.
Over to you, pedro.

Pedro Kertzman (01:01):
Ritu, thank you so much for joining the podcast.
It's really great to have youhere.
Hey, pedro, thank you so muchfor joining the podcast.
It's really great to have youhere.

Ritu Gill (01:06):
Hey Pedro.
Thank you so much for having meon your podcast.
I'm excited to be here and havea conversation with you.

Pedro Kertzman (01:12):
Usually I start by asking the guests their
journey into you know CTI orrelated areas to CTI.
Would you mind walking usthrough that please?

Ritu Gill (01:24):
Yeah for sure.
So OSINT is my jam.
That's open source intelligence.
I started early on.
I mean it's been a while, it'sbeen a number of years.
I started in law enforcement,so I first started with getting
my degree in criminology andthen I started working for law

(01:46):
enforcement pretty much rightafter that and kind of just
built up you know those buildingblocks to where I am today.
One thing I do tell people is,although I have that background
and that was like my roadmap,everybody's journey always looks
different.
No one, nobody's roadmap isgoing to be exactly the same,
because a lot of people are likeoh well, how did you do it?

(02:07):
I want to do it like that.
It doesn't always work that wayand really I kind of got into
OSINT accidentally, because itwasn't an intention initially,
but it's something that, aftermoving around to different
sections and working differentportfolios, eventually I came
across this thing called OSINTand when I started sitting with

(02:31):
some of my colleagues back thenI realized how they were using
it and what it was for and howit was applied in investigations
.
And then it really took offfrom there and I got really
interested and I was curious andI was it was a bit younger, so
definitely had a little moreenergy and uh, all that kind of
stuff as well cool, super cool,and I totally agree, like

(02:52):
everybody's journey will beunique, we just, uh, sometimes
need to learn a little bit.

Pedro Kertzman (02:58):
You know what worked in this situation, on
that situation, and then kind ofdo your own mix and, you know,
move forward right yeah, I, yeah, I agree, I really do.

Ritu Gill (03:10):
I think, um, you know , there's, uh, there's, there's
a hundred different ways to getto that same destination, right?
So I always say, uh, dependingon you know where somebody's
located in the world, uh, maybewhat their background education
is in they have that and maybethat's not even an avenue they
need to pursue.
It could be something else, itcould be totally a different

(03:31):
pivot, it could be a differentway they come to that same place
.

Pedro Kertzman (03:38):
Yeah, that's a great point.
Different aspects or variableskind of thing, any common
ground-ish like a good way tostart at least get more familiar
with OSINT and see if thatcould be potentially your gem as

(03:59):
well.
Any recommendations around that?

Ritu Gill (04:02):
Yeah, of course I think there's lots of different
opportunities and different ways.
One of the ways that I like wasat that early on stage I wanted
to see how other people wereusing it, because really I
didn't have an understandingmaybe of it before, but once I
saw how it was being used inresearch, in investigations, and

(04:23):
then I could apply it myself inresearch, in investigations,
and then I could apply it myself.
So one thing I tell people isif you're already in a role that
maybe could segue into you know, an OSINT role or more OSINT
focused, if you get theopportunity to work on you know
various types of files, I wouldsay yes.
So I often tell people say yesmore than no.

(04:44):
And what that means is exampleI worked with a number of people
.
We had different portfolios.
This is early on in my career.
You know.
If a manager came around saying, hey, would you take on this,
this file, and I'm like, oh,that's not really my portfolio,
I don't really do say it wasfraud.
But if I said yes, it kind ofbrings me into a new kind of

(05:10):
investigation, a different wayof looking at it, and then
there's lessons learned as well,right?
So that's what I mean by sayingyes more than no, because a lot
of people would be like, oh,it's not my portfolio, no,
thanks, uh, get somebody else todo it.
Um.
So one of those things reallyhelped me, I think, early on, um
, because I got exposure todifferent types of things that

(05:31):
maybe other people didn't Right.
Um, that's one thing for sure.
Another one again I did likereading is huge for me, getting
some of those OSINT books outthere, um, some current ones and
then reading it and then alsoapplying what you learn.
So don't just read it, but gotry out the techniques, go try

(05:51):
out some of these things.
Can you somehow apply what'smentioned in the book?
And I think that's another wayof you know.
Doing is a way of learning aswell.
There is a lot out there, soyou need to be able to decipher
the good stuff from the fluff.
So that's another part of it,because the OSINT world, like
this day and age, I feel likeit's really changed from what it

(06:12):
was five years ago, 10 yearsago.
But yeah, those are a few tipsthat I would.

Pedro Kertzman (06:17):
I would start with Any suggestions on that
topic, like how to differentiategood tools or good old scenes
from bad ones or not so goodones?
If we can put this way,especially for people starting
how to do this vetting process,what's the real good stuff to
start using?

Ritu Gill (06:35):
Yeah, I think, like I mean, this conversation can go
in a lot of different ways.
There's Getting your OSINTtools is one part of it, but
also I had mentioned, you know,the good stuff from the fluff,
right?
Sometimes it is really hardbecause we have a lot of people
in the space.
Now, you know, I couldrecommend individuals.

(06:56):
Like I mean, I would say, hey,follow me, I won't give you
fluff, but I'm not the onlyperson, and also I'm a little
biased.
Yeah, yeah, I'm not the onlyperson and also I'm a little
biased, yeah, yeah.
So I think I think it reallycomes down to many things, but
some of the people that you know, again, I've been in this kind
of world or industry for a longtime, so I know who's who in the

(07:21):
zoo for the most part.
Um, you know, I, of course Idon't know everything, but, uh,
I've been around long enoughwhere you know.
I know whom I go to.
People are people I followonline.
Um, you know, uh, some some ofthe big OSINT names out there as
well.
Um, but when it comes down to,like you know, vetting your
OSINT tools this is somethingthat has come up a number of

(07:42):
times, but it is such animportant topic.
You know people will ask like,oh well, ok, you know you do.
Like, how do I do it?
Well, you need to ask the rightquestions.
You know who's behind this tool.
Do you know?
Is it apparent?
Is it something that's kind ofhidden?
You know, if I'm going toinvest in a tool and run my

(08:04):
searches through it, if I can'tfigure out who owns the tool,
I'm a little concerned.
Oh yeah, right.
So it's almost like OSINT, theOSINT tools in itself.
Right, maybe do some dig some,dig up some research on them,
and there's been someinteresting examples of how
people have done that Right andto uncover things that they

(08:26):
initially weren't in front ofthem.
So you can find out a lot bydoing that right.
Do your research, do your duediligence before getting into
some of the tools, even thingslike you know who owns it?
Do they save your searches?
Who sees your searches?
All this stuff, stuff isimportant and it's another part

(08:46):
of opsec.
Having good opsec and oscent iskey.
Um, that term opsec, like youknow, we say use sock puppets,
right?
What does that mean?
Using research accounts ratherthan your personal social media
to conduct research andinvestigations?

Pedro Kertzman (09:02):
no, that's awesome, especially nowadays, I
think, even with folks trying topretend during hiring process,
uh, that they are somebody theyare not actually.
So yeah, vetting those tools,please, before you put any
confidential information on them.
I think it would be super,super critical.

(09:23):
What about, like like the nextstep People possibly listening
are already doing some OSINT andthey want to see how can they
kind of up their game.
What would be like somethingyou saw in the past that kind of
gave you like an extra or ahigher level of OSINT skills?

Ritu Gill (09:46):
I would say overall, the answer to that would be
practice, practice, practice.
You know, again, my method.
I was very passionate.
I started learning so much thatI started to teach colleagues
on what I was finding.
So you know, there's differentavenues again, like how somebody
would go from you know thispoint to that point.

(10:11):
But if you're not only, youwant to practice the things that
you kind of read about andcontinue to get better at, but
in those instances you mighteven uncover ways that are
unique in how you're using opensource and that, like I mean,
people write blogs about it,people will teach other
colleagues about it.
So for me, I really, once I gotinto it, I got really
comfortable and I felt I had afew things to share with

(10:34):
colleagues.
I started teaching open sourceand, honestly, you learn a lot
even when you're teaching, and Ialways say, as an instructor
myself, I don't know everything,but I'm kind of, I'm open to
learning and I learn things fromparticipants, from students,
all the time.
Um, but I also have a lot toshare.
But over the years I thinkthat's added a lot to bringing

(10:56):
me from you know this point to alittle higher.
So, um, yeah, those are a fewthings that I can think of.

Pedro Kertzman (11:03):
That's amazing.
Practicing is really important.
And mentioning blogs, whatabout your blog?

Ritu Gill (11:10):
Yeah, for sure there's.
I mean I can mention there'slots of OSINT content out there.
I do have, you know, I wear alot of different OSINT hats.
I always mention that.
But yeah, I put out a freeOSINT newsletter.
That's a good way to, you know,stay on top of what's out there

(11:30):
, because I'm pretty involvedwith the OSINT community, still
online as much as I can be.
Um, every Friday I put out um anewsletter on the top like five
things that I've seen andthat's usually five blog posts

(11:51):
or um, something of interest.
So that could involve like aresearch case, maybe a case
study, maybe some tools, maybesomething else that's related to
OSINT.
Um, yeah, and people can gocheck that out um on uh, it's a
forensic, osint is the websiteand then you would just click on
newsletter and you can sign upfor free there.

Pedro Kertzman (12:11):
Perfect, thanks for sharing that.
And so you're mentioninginvestigations, right?
Any suggestions on how to useOSINT to do investigations?

Ritu Gill (12:25):
Yeah, there's so many different ways.
I mean that's a big question,you know.
Think of it as, put yourselfkind of in that space, if you
were the target, what iseverything someone could find
out about you using your name,your maybe email address, maybe

(12:45):
phone number?
So that's one part of likedoing the research.
But there is a key differencebetween doing research and
producing Intel.
So there's like OSINT being,there's the information side of
it, and then there's the INTright, the intelligence of it,

(13:07):
and then there's the INT right,the intelligence.
I often tell people thedifference is that without
analyzing and adding value tothe information, it is not
intelligence.
So typically we start with aintelligence question in the
intel world and, as an analyst,that's where you would start
with, like what's your objective?
Like why are we doing whatwe're doing Right?
Are you looking to find atravel pattern?

(13:30):
Are you looking to identifylifestyle or is it something
else?
Are you trying to locatesomebody who's wanted?
So number one is find out whatyou're doing and why you're
doing it, and then that thatkind of can help direct the
research part of it.

Pedro Kertzman (13:45):
OK, cool, you mentioned a few examples.
That will uncover a lot ofstuff from people you're doing
your work with.
What would be like the ethicalaspects around that, what are
like boundaries or anythingrelated to it?

Ritu Gill (14:01):
Yeah, that's a good question.
Ethics and OSINT is reallyimportant.
The first thing that comes tomind for me is that's a good
question.
Ethics and OSINT is reallyimportant.
The first thing that comes tomind for me is OSINT for good.
You know cause.
You can use OSINT for bad aswell, so, but the concept of
OSINT for good has been aroundfor a while, but essentially it
means do no harm, right, becausewe can cause a lot of harm

(14:23):
using open source intelligencetoo, and so we want to really
focus on doing good, not doxingpeople with information being
sensitive to currentinvestigations out there.
So we read the news.
Sometimes there's an unfoldingevent.
I don't want to get involved tothe point where I'm doxing

(14:49):
people.
Maybe law enforcement's workingon things.
It's very different if you'retrying to help and then you pass
on this information privatelyto law enforcement.
I encourage that in that space.
But you have to be very carefulwith how we use OSINT or open
source resources out there andsome of the techniques we know
there is, you know, there.

(15:09):
I also recommend there'sOsmosis Association.
They're great to follow becausethey are an association for
OSINT professionals and theyreally push for ethical OSINT.
So you know, that's another keypart of it and I think it
really is important.
Sometimes ethics gets leftbehind, but I feel like there's

(15:30):
a lot more focus in it in thelast number of years.

Pedro Kertzman (15:33):
And yeah, that's great about the ethical within
OSINT.
Thank you.
And what about if people, forexample, want to quote unquote
practice, but I want to use itlike a real person to it?
Any other alternative to that?

Ritu Gill (15:49):
Yeah, yeah, for sure.
I mean I always mentioned thatpeople should you know if they
have a family member or maybeit's their spouse and, with
permission, you know, they sayI'm going to try to dig up
everything about you and and seeif I can you know see how
private you are, everythingabout you, and and see if I can
you know see how private you are.
That's a good way to check,right?
People do that on themselvesall the time.

(16:10):
Um, another thing I can justquickly mention is, you know,
setting up Google alerts.
You know on your name, maybe,or you know that's something I
use because my name does pop upin different places, but I do
want to know when that happens.
Um, cause I can't stay on topof everything all the time.
But Google Alerts is one way todo that.
But when it comes to you know,that practical kind of OSINT,

(16:34):
maybe people want to get theirhands, you know, right into it.
I would say there's manyopportunities to do this.
Some are free things right.
There's people like SophiaSantos who, if you look her up
on you know, google her name andjust put OSINT next to it, I'm
pretty sure her blog will comeup, but she pushes out OSINT

(16:57):
exercises that people can be apart of, you know, sign up and
go through themselves, and thenshe also puts the answer out
there too.
So the answer's there as well.
So you might be stuck, um, butshe does a really good job of
putting some great exercises forpeople to, you know practice at

(17:18):
the end of the day.
So that's one again, it's niceto have free stuff.
Some people love GeoGuessr.
Have you heard of that one?
No, yeah, so that's a reallybig one where people are like
trying to find.
They give you an image and theytry to find out where in the
world it is, and it's gamified,right?

Pedro Kertzman (17:37):
Oh, that's cool yeah.

Ritu Gill (17:39):
Yeah, and then there's other stuff like
TraceLabs.
Right, you are essentiallyhelping law enforcement find
missing people.
So they do these ctfs where youknow it might be at a
conference.
They do a few events in theyear where you're essentially
you can be solo or you can bepart of a team, but you're
trying to help identifybreadcrumbs on in on an

(18:02):
individual so you know, say itwas whoever it is, john Smith is
missing and they give you whatthey know about this person.
You go on the internet and findall the information and then
there's a winner at the end whohas the most points, essentially
so that one.
They're like gamified, but for areally good cause and if people
have, if you want to spend somemoney again, some really high,

(18:26):
really great quality training iscalled Case Scenarios with a K.
So Case Scenarios is awesome.
It's Espen and Ray Baker puttogether, but again big OSINT
names, but really cool.
Their graphics are like thebest I've ever seen in a

(18:47):
scenario like that.
But it tests your knowledge andyou can start with beginner.
But they have different likeprojects you can like sign up
for.
You know, I think as little asI think it starts from maybe $50
to I'm not sure the limit, butthat's something also if
somebody wants to invest alittle bit more into that
learning piece.

(19:07):
So again like and those arejust quick hits things at the
top of my mind that I'm like hey, these are out there for people
to explore.

Pedro Kertzman (19:15):
That's great advice, thank you, and I'll make
sure I'll include the links onthe description of the episode,
so if anybody wants to searchany of these sites, there will
be a link over there.
And it's interesting becauseyou mentioned practicing on
ourselves and all that.
I used to be a little proudthat my online presence would be

(19:38):
like super small, my, my, mydigital footprint, if you will
right.
But then the podcast came upand it's everywhere.
Oh okay, can I have everythingright?

Ritu Gill (19:51):
yeah, yeah, I, I.
I had the same thing.
When I started out, I was very,you know, I only went by OSINT
techniques, I didn't really tellpeople who I was.
And then I came to a pointwhere I was like, what do I want
to do?
And you know, everybody's OPSECthreat level is going to be a
little different, and so you gotto make an assessment.
But yeah, you're right, youcan't have everything.

Pedro Kertzman (20:11):
Exactly, exactly , yeah, but don't search on us
people, don't do us yeah yeah,yeah, don't do that.

Ritu Gill (20:16):
Yeah, yeah, definitely do not.

Pedro Kertzman (20:20):
Great.
That's super important Again,especially because you're
uncovering so many aspects ofpeople's digital footprints or
breadcrumbs.
Yeah, you got to be carefulwith this stuff that you're
having access to and, again, howyou store it or which are the
tools you're running thatinformation through.

(20:41):
It's not only that you arebeing careful about the use, the
after use of that information,but even if you're like
recklessly putting thatinformation through a tool
you've never heard of or youknow are not properly vetted or
something like that, it will get.
It potentially will get outthere.

Ritu Gill (21:03):
Uh, just because you use that tool, if you're not
trying to proactively disclosein that information I have
examples as well where you knowpeople get into oscent because
it is the fun thing to do and,uh, you know it does get
highlighted in movies, shows andall that stuff to show you kind
of how fun it can be.
But people are very quick touse any OSINT tool that comes

(21:24):
across their desk.
And that's where it's reallyconcerning, because you don't
know anything about that tooland you could be capturing every
keystroke.
Right, it could be capturingeverything about you.
It might say, sign up for ouraccount and you know it's
collecting all this information.
So I do have examples where Iwas surprised at times to see,

(21:46):
like, oh, the ownership behind atool and you know at first
glance you would never think youknow it's associated to a
certain, maybe region in theworld or something else.
But when we do a little bit ofresearch it can go a long way
because it could tell you thingsabout that website or that tool
maybe the tricky thing.

Pedro Kertzman (22:05):
I'm not sure if it's fair to divide.
We're going to find two bigchunks of osin tools commercial
ones, that are probably easierquote unquote, easier to have a
vetted list of the appropriatetools to use.
Maybe I could put Maltigoprobably on the top three of

(22:25):
this kind of list, but there area lot of tools that are like
GitHub repositories or otherwebsites and so on sites and so
on and so any I don't know goodlist or website where people
like completely uh overwhelmedon how to do the osint of the
osint tools, uh could refer toto kind of a as a starting point

(22:50):
at least yeah, I can.

Ritu Gill (22:52):
What I can do is, um, I do have a.
I'll share a link with you.
I don't know if you can put itin the show notes, but it's an
OSINT tool checklist that we puttogether in terms of you know,
one of the things is know theperson who's created it.
But other questions you can askif you need to find out more.

(23:13):
Of course, there's a lot ofways we can vet tools.
There's other websites that wecan use to see if they're you
know what they're doing in thebackground maybe.
But this simple tool is astarting point, so I'll
definitely include that forpeople that are listening, that
are curious to know what thatmight look like.

Pedro Kertzman (23:32):
Perfect.
No, that sounds great, thankyou.
And talking about also learninghow to do that and any other
aspects within the OSINT, anygood learning sources, not
necessarily to learn thetechnicalities or tools, but how
the industry is moving or newskills to develop when doing

(23:56):
investigations, or anything likethat comes to mind.

Ritu Gill (24:00):
Yeah, I mean there's so many different areas now it's
hard to mention all of thembecause we have we have like,
the traditional OSINT analystsdoing this work.
We also have investigativejournalists that are doing OSINT
Right.
So there's like differentcommunities out there to follow
and that's why I say there's somuch.
I used to be part of thisorganization called OSINT

(24:24):
Curious.
I don't know if you ever cameacross it, but it was a number
of us that would push out blogposts and video posts on like
ways to do certain OSINTresearch techniques, ways that
people could apply some of thethings they learn, even things

(24:45):
that you might not want to do orbe aware of.
So there's lots of differentthings there.
We did shut down the project afew years ago, but that website
is still available and there'sstill blog posts up there that
are relevant.
They're just not updated.
But again, I worked along witha number of you know really
well-known OSINT people and likethose would be like one of the

(25:08):
sources and the people involvedin OSINT Curious.
I would also say, like I mean,go do some open source and find
out who those people were andfollow them online.
Right, do some open source andfind out who those people were
and follow them online Right.
A lot of these posts really,really helpful tips and tricks
on their own social media rightLinkedIn, twitter, other places-
and uh any like uh closingthoughts for the listeners, uh

(25:33):
many anything.
Yeah, of course.
So, uh, as just a closingthought, there's a couple of
things I want to mention.
Networking is really big inthis community, so it's one of
those things that I reallyrecommend.
I know it's not always easy forpeople, but get out to some

(25:53):
events.
Osmosiscon is one of thebiggest OSINT events and there's
going to be.
Osmosiscon is one of thebiggest OSINT events and there's
going to be OsmosisCon nextyear in June.
But get there and talk topeople.
And sometimes it's hard, but inthose spaces when we're doing
shared work, it's an easy wayright to connect with people

(26:14):
doing the same type of work.
But you can learn and you mightget opportunities that you
wouldn't have got otherwise.
So you kind of have to putyourself out there at times, but
that's one thing I reallyrecommend and it doesn't have to
be that event.
There's other events that youmight come across in the OSINT
world.
Get out there, talk to people,see what kind of work they're

(26:34):
doing, ask the questions.
That's really been helpful inmy career as well.
I think that's been impactful.
And other things I alreadymentioned the free newsletter
that you can sign up for.
The idea is to keep learning,you know, but also take breaks,
don't burn out, because that canhappen as well.
So those are a few, you know.

(26:56):
Closing thoughts for my side.

Pedro Kertzman (26:58):
That's awesome, thank you.
And you mentioned about theconferences, right, uh and um, I
think it's black hat, if I'mnot mistaken.
They often have like a liveoscent track or day or something
like that, or defcon, and I'mblanking.
Uh, have you been on those?
Those Do you think it's worthto be there?

(27:19):
Or more generic-ish conferencesthat will have some OSINT in it
.

Ritu Gill (27:25):
Yeah, I think all of them offer something of value.
For sure I would start smallerrather than bigger, because it
can be overwhelming tooSometimes when there's too many
people, I find like it's reallyhard to network in those spaces
because it's just chaos.
But at the same time I feel Icould go to any one of them if

(27:47):
they have some OSINT side to itor a track, and you will learn,
you'll meet other people andit's just sparking up some
conversations and being open tolearn is the main thing.
But yeah, I encourage, whereveryou are in the world trying to
find, to see if there'ssomething in your community that
has you know that's alignedwith OSINT in any way.

(28:07):
That's a good starting point.

Pedro Kertzman (28:10):
Amazing, amazing .
Ritu, thank you so much forcoming to the show.
I really appreciate all theinsights and I'll hope I'll see
you around, of course.
Yeah, thanks so much for comingto the show.
I really appreciate all theinsights and I hope I'll see you
around.

Ritu Gill (28:20):
Of course, yeah, thanks so much, pedro.
Thanks for having me on yourpodcast.
It's really an honor.
I appreciate it.

Pedro Kertzman (28:25):
The honor is all mine, thank you.

Rachael Tyrell (28:30):
And that's a wrap.
Thanks for tuning in.
If you found this episodevaluable, don't forget to
subscribe, share and leave areview.
Got thoughts or questions?
Connect with us on our LinkedIngroup Cyber Threat Intelligence
Podcast.
We'd love to hear from you Ifyou know anyone with CTI
expertise that would like to beinterviewed in the show.
Just let us know.
Until next time, stay sharp andstay secure.

(28:51):
We'll be right back.
Advertise With Us

Popular Podcasts

NFL Daily with Gregg Rosenthal

NFL Daily with Gregg Rosenthal

Gregg Rosenthal and a rotating crew of elite NFL Media co-hosts, including Patrick Claybon, Colleen Wolfe, Steve Wyche, Nick Shook and Jourdan Rodrigue of The Athletic get you caught up daily on all the NFL news and analysis you need to be smarter and funnier than your friends.

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.