Making Deception a Part of Your Enterprise Defense Strategy

Most enterprise defenses focus on preventing attackers from getting in. But what if you could distract and trick attackers by making them think they are advancing their attack –and then mislead them? In this webinar, experts discuss emerging tools and strategies for cyber deception, which enables you to put your attackers into a juicy-looking, yet time-wasting environment. The session will also explore new innovations in concealment technology that hide and deny access to production assets, as opposed to using decoys and lures.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn to create the illusion of access and penetration
  • Convince bad actors that what looks like gold is something with no real value
  • Discover how deception techniques can buy you and your organization valuable time in discovery and prevention
  • Bolster your defense posture with fake assets designed to draw attention

Featured Speakers

  • Jason Clark
    Jason Clark
    Independent Security Researcher

    Dr. Jason Clark is a subject matter expert in cyber security with nearly 20 years of real-world experience within the intelligence community, academia, and industry. He has extensive knowledge and experience on a variety of technology related topics. Currently, his main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. Dr. Clark holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees, delivered numerous virtual webinars, and has presented his published work at a variety of conferences around the world.

  • Joseph Salazar
    Joseph Salazar
    Technical Marketing Engineer
    Attivo Networks

    Joseph Salazar is a veteran Information Security professional with over 20 years of both military and civilian experience. He is a retired Major from the US Army Reserves, having served 22 years as a Counterintelligence Agent, Military Intelligence Officer, and Cyber-Security Officer. He's been a Systems and Security Administrator, a CSIRT Analyst, a Security Operations Manager, and a Computer Forensic Investigator in his civilian career. He maintains the CISSP, CEH, and EnCE certifications, holds a BA in Legal Studies from UC Berkeley, and currently works for Attivo Networks as a Technical Marketing Engineer.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By