Explore the concept of deploying deceptive systems to lure attackers from the shadows in this 36-minute conference talk by Kevin Gennuso, presented at Derbycon 2018. Learn about innovative cybersecurity strategies that utilize deception techniques to enhance network protection and gain valuable insights into attacker behavior. Discover how these systems can be implemented to proactively defend against threats and improve overall security posture.
Overview
Syllabus
Track 3 08 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso