Hi [[ session.user.profile.firstName ]]

Attivo Networks

  • Date
  • Rating
  • Views
  • How to Use Deception to Defeat Your Adversaries
    How to Use Deception to Defeat Your Adversaries
    Geoff Hancock, CEO of Advanced Cybersecurity Group; Tony Cole, CTO Attivo Networks Recorded: May 23 2019 61 mins
    Many organizations are still playing the slow game of chasing after the bad guys. They are trying to make the most of their budget, their tools, but unfortunately, the attacker still has the advantage.

    Times have changed and there is a better way. A better way to control what happens on your network- the way it should be.

    Deception-based cyber defenses are powerful tools. They are effective at decreasing dwell time, imposing costs, and otherwise distracting adversaries to give defenders the upper-hand.

    During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker's OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

    Key Takeaways:

    • Background of Denial and Deception and how it applies to the cyber realm
    • How the reverse OODA loop works
    • How cyber deception is implemented across the strategic, operational and tactical realms.
    • Use cases for Healthcare, Energy, IT, Telecom and more
    • What impact can deception have in changing the game for defenders long term
  • Deception Though the Eyes of a Forensic Researcher
    Deception Though the Eyes of a Forensic Researcher
    Dr. Peter Stephenson and Carolyn Crandall Recorded: Feb 21 2019 60 mins
    Dr. Peter Stephenson has 55 years of experience consulting and teaching in the cybersecurity space. He now spends his time researching and writing about cyber criminology, cyber jurisprudence, and cyber threat/intelligence analysis on large-scale computer networks. Join this webinar to learn more about his forensic research and why deception technology has proven to be instrumental within the security tool set he uses for forensic analysis and faster remediation to threats.

    This Q&A style webcast will be moderated by Carolyn Crandall, Chief Deception Officer at Attivo Networks and will dive deeper into advanced deception strategies for root cause analysis and faster response to threats. Don’t miss your chance to register now to find out why deception is not just about early detection but also arms the defender with automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.
  • Deception Technology: Fad or Fashion for 2019 and Beyond
    Deception Technology: Fad or Fashion for 2019 and Beyond
    Carolyn Crandall, Attivo Networks, Chief Deception Officer Recorded: Dec 10 2018 46 mins
    Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

    Carolyn Crandall, Chief Deception Officer at Attivo Networks will explore how deception has evolved, how it is impacting dwell times and how adversary intelligence gathering is being used to change the asymmetry of an attack and for more confident and automated incident response.

    During this informative speaking session attendees will learn:

    - How to differentiate deception solutions
    - Why and where to deploy deception
    - What the key factors fueling adoption are
    - What’s deception for Active Defense
    - What’s in store next for deception technology

Embed in website or blog