Maturing your cyber deception program: what’s the plan, Stan?

OVERVIEW

Defense teams are adopting cyber deception to detect and hunt threats. Honeypots and honeytokens provide early warning of attacker actions. One of the challenges that defenders grapple with is: where should I place these deceptions ? How many should I deploy ? What should they represent ?

This session provides real-world insights from a security practitioner on strategies for an effective rollout of cyber deception. Learn about the importance of identifying the goals for your deception program, one that focuses on defending against threats, protecting high-value assets, slowing down the adversary.

See how deception can be used to defend against identity threats, insider risk, and ransomware. Learn about the considerations and best practices for deception design. This provides you with practical insights that can be applied on a daily basis for cyber defense.

Presented By

Suril Desai Headshot

SURIL DESAI

VP Engineering, Acalvio