Data Breach , Data Breach Prevention and Response Summit , Events

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?
Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But new techniques and capabilities are delivering new approaches to how cyberthreats are dealt with, proactively. During this session, we will deconstruct recent attacks from a hacker's perspective and show how you can use deception technology to detect stealthy attacks, illuminate network blind spots and minimize breach detection time - highlighting the benefits of deception defenses. But what about when these techniques don't work as planned? Can deception technology actually create more problems long-term? We will explore the positives and negatives of deception technology.

See Also: 2017 Predictions on Data Security: Insights on Important Trends in Security for the Banking Industry



Around the Network