Lure & Deceive: Using Deception Technology to Defeat your Adversary

Presented by

Allan Thomson, LookingGlass, CTO; Chris Dahlheimer, LookingGlass, Aeonik Product Owner, Sahir Hidayatullah, Smokescreen, CEO

About this talk

LookingGlass Cyber and Smokescreen invite security teams who have already invested in deception technology to improve its effectiveness in deceiving and deterring adversaries, and use it to support other security processes in your organization. Allan Thomson and Chris Dahlheimer, LookingGlass Chief Technology Officer and Aeonik Product Owner, and Sahir Hidayatullah, Smokescreen CEO, will team up to discuss the underpinnings of our integrated deception technology and how the following advantages can enhance your existing solution: · An invisible MAC/IP layer that allows you to proactively target and lure adversaries into deception decoys · Forensic intelligence on your adversaries to better understand their motivations and plan more effective defense strategies · Targeted mitigation options that enable you to delay or avert adversary attacks, and refine your response based on their behaviors The team will provide multiple, live demonstrations so you see how these technologies can improve your existing security threat detection and mitigation activities.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (5)
Subscribers (6463)
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation. By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners. Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.