Implementer's Guide to Deception Technologies

Implementer's Guide to Deception Technologies

In today’s digital environment, organizations tend to have difficulty detecting attackers on their networks in a reasonable time frame. The reason: Traditional detective technologies focus on finding evil, and attackers have learned to avoid looking evil to penetrate defenses. Its time to change that paradigm.

Attendees at this webcast will learn:

  • What deception technologies are all about
  • How deception technologies can assist with common attack types, including account hijacking, human error, vulnerable applications, and insider threats
  • How organizations can implement and automate deception technologies through a SOAR or SIEM
  • What open source tools are available to assist organizations in their implementation initiatives

Register today to be among the first to receive the associated whitepaper written by SANS Analyst and network/cloud security expert Kyle Dickinson.


 

Browse all Webinars