Active Defense & Deception , Events , Incident & Breach Response

The Art of Deception for Advanced Threat Detection

The Art of Deception for Advanced Threat Detection

Deception technology has been on security leaders' radar some time, but now it is becoming accessible to smaller organizations. And in their most recent analyses, market analysts give deception technologies kudos for improved sophistication and maturity.

Deception focuses on deploying assets - such as lures, bogus files, honeypots or simulated SCADA or IoT devices - in hopes of diverting attackers from the targets they most desire.

This expert panel discusses the maturity of deception technology solutions, with a focus on:

  • What are the critical success factors for deploying deception technology?
  • What lessons have been learned by pioneers?
  • What are the key questions to ask when searching for a deception solution?

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.