Explore the concept of deploying deceptive systems to lure attackers from the shadows in this 36-minute conference talk from Circle City Con 5.0 (2018). Learn about innovative cybersecurity strategies as Kevin Gennuso discusses techniques for creating and implementing decoy systems designed to attract and trap potential threats. Gain insights into how these deceptive measures can enhance overall network security, provide early warning of attacks, and gather valuable intelligence on attacker tactics and motivations. Discover practical approaches to integrating deception technology into existing security infrastructures and understand the potential benefits and challenges of this proactive defense strategy.
Overview
Syllabus
Circle City Con 50 111 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso