Deploying Deceptive Systems: Luring Attackers from the Shadows

Presented at DerbyCon 8.0 Evolution (2018), Oct. 6, 2018, noon (50 minutes).

“Assume the network is compromised” has been a popular mantra in information security for years now. So how do defenders operate in such an environment? Honeypots and honeytokens that are well-planned and strategically-placed can enhance any organization’s threat detection capability. This talk will demonstrate a few of the various free, opensource solutions available as well as a strategic plan for deploying them.


Presenters:

Links: