Threat Deception: Tricking Attackers for Fun and Defense

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten in? In this webinar, experts discuss emerging tools and strategies for cyber deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that prevents them from cracking your actual data.

Available:
Wed, Jun 16, 2021 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attend this webinar and you'll:

  • Hear from experts on the latest tools and tactics in threat deception
  • Learn about the benefits of tricking attackers as part of overall defense
  • Get examples of uses cases for threat deception
  • Walk away with a plan for getting started with deception technology in your organization

Featured Speakers

  • Dr. Stanley Barr
    Dr. Stanley Barr
    Senior Principal Scientist
    MITRE

    Dr. Stanley Barr is a three time graduate of University of Massachusetts Lowell. He has a BS in Information Sciences, an MS in Mathematics, and a PhD in Computer Science. He has coauthored published papers in malware analysis, barrier coverage problems, expert systems for network security, and robotic manufacturing. He has been a panelist for conferences on topics including fighting through real world computer network attacks from both external and internal threats. Currently, he is a senior principal scientist at MITRE, a not-for-profit corporation that manages federally funded research and development centers (FFRDCs), where he serves as the capability area leader for MITRE’s cyber denial, deception and adversary management topics.

  • Austin McBride
    Austin McBride
    Data Scientist
    Cisco Umbrella

    I’m a Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. My current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets malicious actors to remain anonymous while purchasing infrastructure and avariciously amassing profit which has been unprecedented in traditional financial markets in recent history. I speak at international and national conferences and regularly contribute to the Cisco Umbrella Security Blog. My background is in data mining, analytics, security research, and data visualization. I live in San Francisco with my wife, son and our rescue dog Spock.

  • Joan Goodchild
    Joan Goodchild
    Senior Editor
    Dark Reading

    Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.

Sponsored By