How to Stay Ahead of Threats With Deception Technology

Logo
Presented by

Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive

About this talk

A Guide to Operational Security in 2021: Episode 7 Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches. When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognizes malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers. In this session, we will discuss: - How deception technology provides a 360-degree approach to security - Why it’s important to have a deep understanding of attacker behavior - How deception technology improves visibility Speakers: - Tod Beardsley, Director of Research at Rapid7 - Chris Dodt, Information Security Specialist at Freedom Financial Network - Jorge Orchilles, Chief Technology Officer at SCYTHE - Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc
Related topics:

More from this channel

Upcoming talks (31)
On-demand talks (571)
Subscribers (47736)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.