Ghost Army, Why Let Attackers Have the Advantage?

Logo
Presented by

Jim Cook, Regional Director, Attivo Networks & Andrew Scully, Head of Cyber, Shelde

About this talk

Cyber Attackers have always been able to trust that their tools and technology. If they manage to break into an organisation’s network through technical means or simply by getting a job there - they can use those tools to understand how to traverse the network and what Tactics and Techniques will allow them to reach their goal without being detected. The same can’t be said in the physical world, where Attackers have never been able to rely 100% on their observations. There are many examples throughout history of Attackers and Defenders deceiving each other – so what lessons can be derived from the physical world and how are organisations applying those lessons in Cyber? Hear from Jim Cook – Regional Director for Attivo Networks on some of the most effective misdirection in history and special guest Andrew Scully – Head of Cyber from Shelde who shares some personal stories of using deception technology to catch attackers.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (43)
Subscribers (5345)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.