Title: Deception Technology, Implementation in Action
CPE Credits: 1 hour (Registration required to receive Certificate of Attendance)
Abstract: Presented by an ONG-ISAC Industry member, this talk focused on Deception technology. Many people view Deception technology as an advanced security control for larger organizations, implemented only after core controls are in place. Or they view it as a honeypot primarily used for research to view cyber threat activity in action. I had those same opinions before we started using it, and now it’s a core component of our program that aligns directly with our philosophy on security.