Hi [[ session.user.profile.firstName ]]

Honeypots are dead. Long live honeypots!

Advanced attacks continue to be increasingly difficult to detect, with an average mean time to detection still hovering over 200 days. We will discuss modern techniques used by attackers to penetrate defenses and move laterally through your organization undetected. Honeypots have historically offered some detection benefits, yet have been challenging to effectively and efficiently scale within the enterprise. Find out how modern Deception 2.0 technology changes this.
Recorded Nov 15 2016 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Roberts, Chief Security Architect, Acalvio
Presentation preview: Honeypots are dead. Long live honeypots!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Countering Zero-Day Ransomware: Deception + MDR Recorded: Nov 11 2020 54 mins
    Raj Gopalakrishna, Acalvio Co-Founder and Head of R&D. Vijay Vasu, Verizon, Sr Manager, MDR, Head of Product Management
    Join our webinar to learn about the new integrated Acalvio Technologies Deception + Verizon MDR offering to detect and mitigate state-of-the-art, zero-day ransomware threats. Hear about advanced ransomware strains like Maze, Ryuk and REvil, that leverage APT style tactics and techniques that attackers use to target enterprises.
  • Zero Day Ransomware wreaks havoc in SA networks: Combat it with Deception Recorded: Nov 2 2020 47 mins
    Krishnanand Krishnankutty, Acalvio Solutions Engineer. Murray Benadie, Founder & Managing Director, Zenith Systems
    Join us on this Webinar where we will show you how effective Next Gen Deception is in countering cyber threats.

    The intensity, volume and success of breaches is impacting South African organisations almost on a daily basis. Malware and specifically Ransomware is a difficult breach vector to detect before it is too late. On gaining a foothold in your network, Ransomeware will (much like human hackers) use automation to probe your network, engage in propagation, establish CnC channels and execute when ready to do so. It is thus imperative that suspicious activity associated with the malware is detected before execution. Effective next gen fluid deception is exceptionally powerful in detecting this activity before it is too late. It does this by using AI to understand your network, your assets and your standards and then deploying hundreds of decoys and potentially thousands of lures and breadcrumbs across your IT estate in a matter of hours. To propagating malware and human hackers, these fake assets are indistinguishable from your real assets and thus when they scan a decoy or try to connect to it, you are immediately alerted of their presence. The use of high interaction decoys then “engage” the malware or hacker to glean more intelligence on their modus operandi, intention and approach so that you can shut them down before execution.
  • Effectively Combating Zero-Day Ransomware: Deception + EDR Recorded: Jul 14 2020 60 mins
    Raj Gopalakrishna, Acalvio Co-founder and Head of R&D. Chris Kachigian, CrowdStrike Sr. Director Global Solution Architecture
    Join our webinar to learn about the new integrated Acalvio Technologies + CrowdStrike offering to detect and mitigate state-of-the-art ransomware threats. Hear about advanced ransomware strains like Maze, Ryuk and REvil, that leverage APT style tactics and techniques to target enterprises.
    Presented by Janani Nagarajan, CrowdStrike Sr. PMM Strategic Partnerships

    Discover how:
    -Modern ransomware attacks have evolved beyond data encryption, backup deletion to now include data exfiltration and data extortion.
    -State-of-the-art ransomware like Maze and Ragnar Locker leverage deception to go around security layers in their campaign.

    Learn how:
    -The combination of Deception Technology + EDR enables precise detection of both known and unknown ransomware.
    -This unique integrated offering enables automated, real-time remediation of advanced zero-day ransomware threats.
    -This combination protects employees and their laptops from ransomware threats even when employees are in a WFH (Work From Home) model.
  • Decoys, Lures & Breadcrumbs: Deception Technology Turns the Tables on Attackers Recorded: Mar 19 2020 75 mins
    Paula Musich - Research Director, Security and Risk Management, Enterprise Management Associates
    The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. Enterprise Management Associates in 2019 conducted a research project to gauge interest in this evolving new defense and uncover deception technology usage trends and advantages it delivers that are unique in the market. Join Paula Musich, a research director in the IT Security and Risk Management practice at EMA, for a webinar that will explore the results of this study. The webinar will highlight:
    •Advantages such as more accurate detection of attackers, a dramatic decrease in dwell time for users, and greater understanding of attackers’ methods
    •Use cases
    •Expectations of those looking to adopt deception technology
  • SANS-Webinar-Real-World-Implementation-Deception-Technologies Recorded: Feb 19 2020 61 mins
    Kyle Dickinson, SANS Instructor, Author, Analyst; Kevin Fiscus, SANS Instructor; Rick Moy, CMO, Acalvio Jim Mason, Sr. Soluti
    Deception technologies are on the forefront of the battle to secure an organizations digital assets. Such technologies build on top of traditional detection technologies, which focus on finding evil, to uncover attacker behaviors that avoid looking malicious to penetrate organizational defenses. But how does that work in real life?

    In this webcast, attendees will learn:

    What deception technologies are all about
    What types of technologies are available
    How deception technologies can assist with common attack behaviors, including account hijacking, exploiting human error and vulnerable applications, and more advanced threats
    How organizations can implement Acalvios ShadowPlex to leverage deception technologies and protect their assets
  • SANS - Webinar - Implementers Guide to Deception Technology Recorded: Feb 6 2020 53 mins
    Kyle Dickinson, SANS Instructor, Author, Analyst
    This recorded webinar covers:

    1. What deception technologies are all about
    2. How deception technologies can assist with common attack types, including account hijacking, human error, vulnerable applications and insider threats
    3. How organizations can implement and automate deception technologies through a SOAR or SIEM
    4. What open source tools are available to assist organizations in their implementation initiatives
  • Decoding the Matrix: Deception-Borne Threat Intelligence Recorded: Oct 25 2018 44 mins
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies
    Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

    About the Speaker:

    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.
  • TAG-Cyber's Ed Amoroso Interviews Acalvio Recorded: Jul 14 2018 22 mins
    Ed Amoroso and John Bradshaw
    TAG-Cyber's Ed Amoroso Interviews Acalvio's John Bradshaw about advanced threats, deception and more.
  • Three Minutes Until the Apocalypse Recorded: Mar 20 2018 47 mins
    John Bradshaw, Director, Solutions Engineering, Acalvio
    Three minutes. In general, front-line security operations analysts have three minutes to evaluate an alert on their front pane of glass and determine if it warrants further investigation or can be dismissed as "not impactful to the organization". Your analysts must be right every single time in order to prevent a breach that could cost millions of dollars, the adversary - they only need to be right one time.

    This session will illustrate:

    - How SOC / IR teams can utilize high-fidelity alerts such as those generated by Deception-based solutions.
    - Power of correlation and data analytics to reduce the time it takes to answer basic triage questions on an alert.
    - How to develop actionable visualizations that improve the hunt for adversaries in your network.
  • Will Artificial Intelligence Strengthen Your Security Stance? Recorded: Feb 15 2018 59 mins
    Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Fusion of Deception and AI for Active Defense Recorded: Jan 17 2018 44 mins
    Satnam Singh, PhD, Chief Data Scientist at Acalvio
    Recent cyber attacks and data breaches clearly show that traditional perimeter-based information security tools are ineffective against ransomware attacks, insider attacks, multi-stage attacks, and APTs.

    Cyber criminals have crafted tools and devised techniques that enable them to evade detection by traditional security tools. Also, even if real alerts are triggered, they can either get lost among a large number of false alerts or lost in a deluge of alerts, resulting in very low signal/noise ratio.

    Deception provides an alternative tool to traditional tools with nearly 0% false positive rate to detect, engage, trap and remediate inside-network attacks. Furthermore, by fusing deception with AI, one does not need to boil the ocean to detect anomalies in raw data. Instead anomalies are surfaced itself when an attacker bumps into the deceptions. Using AI, deception alerts are correlated with other data sources to provide actionable insights about the adversary profile, lateral movements and attack tactics. In this talk, we share our work on the fusion of deception and AI for active defense.
  • Detecting Attackers Within Your Networks Using Autonomous Deception Recorded: Jan 11 2018 60 mins
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies
    This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
  • Agentless Defense Against Ransomware Recorded: Aug 22 2017 56 mins
    Raj Gopalakrishna, Acalvio and Vijay Chuahan, Splunk
    Agentless Defense Against Ransomware with Splunk and Acalvio
  • Power To The People - Knowledge Is Power Recorded: Jul 26 2017 50 mins
    Debra Farber, ITSPmagazine | Chris Roberts, Acalvio | Dr. Christopher Pierson, Viewpost | Arun Vishwanath, SUNY Buffalo
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.

    Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.

    Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.

    Attend this session to gain the initial knowledge necessary by:
    - Learning to ask is this thing secure?
    - Understanding how or why it is or isn’t safe to use.
    - Identifying your role in your own cyber safety and that of those around you.

    It’s time to open our eyes and become aware of our surroundings. Join us to become aware.

    - Debra Farber, Host of The Privacy Pact, ITSPmagazine

    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Dr. Christopher Pierson, CSO and General Counsel, Viewpost
    - Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
  • Teaching Computers to Lie to Defend Themselves Recorded: Jul 19 2017 54 mins
    Professor Mohammed Almeshekah
    This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
  • NotPetya: Wiper or Ransomware & How to Protect Yourself Recorded: Jul 7 2017 60 mins
    Chris Roberts (Acalvio), John Bambenek (Fidelis), Jay Beale (Inguardians), Vince in the Bay
    Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide.

    Topics that will be discussed during this live Q&A panel will include:
    - How is NotPetya different from Petya and Wannacry?
    - Timeline of the attack
    - Impact and aftermath
    - What's next? How can companies better protect their data against similar attacks in the future?

    - Vincent Tocce of the Vince in the Bay Podcast

    - Chris Roberts, Chief Security Architect at Acalvio
    - Jay Beale, COO & CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
  • Cyber Deception Intro Recorded: Jun 28 2017 1 min
    RIck Moy
    1 minute video overview of deception
  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Recorded: May 18 2017 75 mins
    Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech)
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • Securing FinTech through Deception 2.0 Technologies Recorded: May 17 2017 58 mins
    Chris Roberts, Chief Security Architect, Acalvio
    Why the same old things don’t work, and how to build in a strategic advantage that will provide early warning to security teams, while also deceiving and delaying attackers who have already penetrated existing defenses.

    About the Presenter:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration Recorded: Mar 16 2017 17 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies and Josh Downs, Community Manager at BrightTALK
    BrightTALK caught up with Acalvio Technologies security expert Chris Roberts for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and steps to take to avoid it happening to other companies
    - Communication between the techies and senior management
    - Cyber security lessons that the Trump administration could learn
    - The Russian hack of the US election
    - AI & Machine learning in Cyber Security
    - The need for regulation in the growing world of the IoT
    - Improving equality in the cyber security industry

    About the Speaker:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Honeypots are dead. Long live honeypots!
  • Live at: Nov 15 2016 6:00 pm
  • Presented by: Chris Roberts, Chief Security Architect, Acalvio
  • From:
Your email has been sent.
or close