A new and deadly generation of remotely controlled targeted corporate network attacks is challenging core network security assumptions, making prevention-based strategies obsolete. Whilst network security teams are starting to shift their focus from perimeter defense to post-breach detection, traditional detection tools fall short of the mark, either generating too many false-positives or altogether failing to detect attacks in real time. Deception, as a tool in the hands of cyber defenders, can provide quick and accurate detection of advanced persistent attacks, unauthorized access to network assets and data exfiltration. Using a variety of realistic decoys, false trails and fake credentials that look, act and feel real to attackers, defenders can create an intelligent decoy network that will turn the tables on the attackers. They pursue the traps, so you can lure, detect and defend.
PRESENTED BY FIDELIS
This session is part of our Vendor Track and may be more commercial in nature
After completing this session, the learner will understand: