Deception: The Next Step In Cyber Defense

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that keeps them away from your actual data.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn how deception can be used -- for detecting threats, misdirecting adversaries, learning attacker behavior, and more
  • Get tips for making convincing decoys and tempting lures
  • See how sophisticated threat deception technology works

Featured Speakers

  • Daniel Norman
    Daniel Norman
    Senior Solutions Analyst
    ISF

    Dan Norman is a Senior Solutions Analyst at the ISF, helping ISF Members to manage current and emerging information/cyber risks. Dan’s historical focus has been on threat intelligence and technology forecasting, with emphasis on running cyber security exercises to prepare organisations for future threats. Dan is also the lead author of the human-centred security research series, which leverages psychological theory to understand manipulative attack techniques and identifies how weaknesses in the human mind can lead to security incidents. Dan also helps organisations to design information security systems, architecture and environments to effectively mitigate the risks associated with human behaviour. Previous to working at the ISF, Dan was a project manager at Goldman Sachs.

  • Wade Lance
    Wade Lance
    Field CTO
    Illusive Networks

    Wade Lance has been productizing new technologies in education, healthcare and information security for over 20 years. He has diverse experience in solution design for global 1000 cybersecurity teams, an extensive background in advanced cyber-attack detection, and a specialty in cyber deception methods and platforms. Prior to his career in information technology, Lance was a professional mountain guide. As Program Director at Appalachian Mountaineering he developed a new method for technical rock and ice climbing instruction that is still used today to teach advanced skills for the most dangerous environments.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By