Denial and deception are tried and true defensive strategies, widely employed across thousands of years of human warfare. In today’s cyber warfare realm, digital denial and deception techniques such as honeypots and honey tokens offer a way for organizations to incorporate these techniques into their own network detection and response strategy. When combined with threat hunting, deception offers defenders the opportunity to engage and detect adversaries *earlier* in the attack lifecycle and prevent or limit the scope of an attack.
This webinar will cover the following:
Matt Hosburgh - Founder, TRACED
Matt is a passionate security practitioner with one aim: to make what matters most to an organization more secure. Matt has over 15 years of experience working in a variety of industries and verticals. From the US Government, Oil & Gas, and Financial Services industries, to the freelance and start-up world. Matt brings a breadth of security experience to the table from both offensive and defensive security angles and holds a Master of Science in Information Security Engineering from the SANS Technology Institute, and maintains several GIAC Certifications, to include the GSE.
John Gamble is Director of Product Marketing at Corelight and has a decade of experience working in the data protection industry representing privacy, security, and identity verification solutions, including his most recent role as Director of Product Marketing at Lookout, a mobile endpoint security company.