Level up your Security Operations with Deception Technology

Presented by

Allan Thomson, LookingGlass, CTO; Chris Dahlheimer, LookingGlass, Aeonik Product Owner; Sahir Hidayatullah, Smokescreen, CEO

About this talk

LookingGlass Cyber and Smokescreen invite security practitioners who are currently not using deception-based threat defenses to discover how it can reduce operational complexity. Through targeted luring, invisible decoy routing, and behavior-based threat mitigation, you will bring greater visibility and intelligence into your security operations. Allan Thomson and Chris Dahlheimer, LookingGlass Chief Technology Officer and Aeonik Product Owner, and Sahir Hidayatullah, Smokescreen CEO, will team up to take you under the hood of our integrated deception technology and discuss the following advantages: Forensic intelligence on your adversaries to better understand their motivations and plan more effective defense strategies An invisible MAC/IP layer that allows you to proactively target and lure adversaries into deception decoys Targeted mitigation options that enable you to delay or avert adversary attacks, and refine your response based on their behaviors The team will provide multiple, live demonstrations so you see how these technologies work together to enhance your day-to-day security threat detection and mitigation activities.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (5)
Subscribers (6463)
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation. By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners. Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.