A Guide to Operational Security in 2021: Episode 7
Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.
When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognizes malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.
In this session, we will discuss:
- How deception technology provides a 360-degree approach to security
- Why it’s important to have a deep understanding of attacker behavior
- How deception technology improves visibility
- Tod Beardsley, Director of Research at Rapid7
- Chris Dodt, Information Security Specialist at Freedom Financial Network
- Jorge Orchilles, Chief Technology Officer at SCYTHE
- Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc