Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Bootcamp Series Part 2: Disrupting the Attacker’s Toolkit - During the Attack Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE Attackers are increasingly targeting enterprise identities to impersonate users, allowing them to evade defenses, elevate privileges, acquire targets,... 2 months ago | 31 mins How to Stay Ahead of Threats With Deception Technology Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive A Guide to Operational Security in 2021: Episode 7 Deception technology deceives attackers by distributing traps and decoys across your system infras... 2 months ago | 42 mins [APAC] How to Stay Ahead of Threats With Deception Technology Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophis... 4 months ago | 42 mins The Art of Deception: A Defenders Secret Weapon Doron Kolton, Sr. Product Manager & Rami Mizrahi, VP, Software Engineering How do you keep a cybercriminal who has managed to infiltrate your network from doing real damage? Deceive them! Make them think that they’ve found pa... 5 months ago | 39 mins Decoys, Lures & Breadcrumbs: Deception Technology Turns the Tables on Attackers Paula Musich - Research Director, Security and Risk Management, Enterprise Management Associates The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining gr... 2 years ago | 75 mins Deceiving the Attacker Diana Kelley | Chris Roberts | Christina Fowler When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach. Join t... 1 year ago | 56 mins Be Resilient with IBM and Attivo Networks Joseph Salazar, Technical Deception Engineer, Attivo Networks and Chris Coburn, Technical Development, IBM Security Attivo Networks® has integrated with IBM® to provide advanced security orchestration and incident management through the Resilient SOAR platform, givi... 2 years ago | 48 mins Deception Technology 101: Implementer's Guide to Deception Kyle Dickinson, SANS Analyst Everything you wanted to know about Deception Technology but were afraid to ask. Deception is a proactive cyber defense strategy. Deception provides a... 1 year ago | 51 mins Zero Day Ransomware wreaks havoc in SA networks: Combat it with Deception Krishnanand Krishnankutty, Acalvio Solutions Engineer. Murray Benadie, Founder & Managing Director, Zenith Systems Join us on this Webinar where we will show you how effective Next Gen Deception is in countering cyber threats. The intensity, volume and success of ... 2 years ago | 47 mins Machine Learning Success: The Key to Easier Model Management Ellen Friedman PhD, Principal Technologist, MapR Listen to Ellen Friedman, co-author (with Ted Dunning) of a new short O’Reilly book Machine Learning Logistics: Model Management in the Real World, to... 5 years ago | 59 mins