We make the world's networks safer.

How to Hunt for Insiders with Network Deception

Denial and deception are tried and true defensive strategies, widely employed across thousands of years of human warfare. In today’s cyber warfare realm, digital denial and deception techniques such as honeypots and honey tokens offer a way for organizations to incorporate these techniques into their own network detection and response strategy.  When combined with threat hunting, deception offers defenders the opportunity to engage and detect adversaries *earlier* in the attack lifecycle and prevent or limit the scope of an attack.   

This webinar will cover the following:

  • Provide a practical overview of various denial and deception techniques
  • Reveal methods for implementing them in your environment
  • Demonstrate how to pair these techniques with comprehensive network security monitoring to achieve successful threat hunts. 

On demand:

We collect your name and email so we can send you the webcast details. Check out our privacy policy to learn how we keep your personal information secure.

Matt Hosburgh - Founder, TRACED

Matt is a passionate security practitioner with one aim: to make what matters most to an organization more secure. Matt has over 15 years of experience working in a variety of industries and verticals. From the US Government, Oil & Gas, and Financial Services industries, to the freelance and start-up world. Matt brings a breadth of security experience to the table from both offensive and defensive security angles and holds a Master of Science in Information Security Engineering from the SANS Technology Institute, and maintains several GIAC Certifications, to include the GSE.

John Gamble, Director Product Marketing, Corelight

John Gamble is Director of Product Marketing at Corelight and has a decade of experience working in the data protection industry representing privacy, security, and identity verification solutions, including his most recent role as Director of Product Marketing at Lookout, a mobile endpoint security company.