Threat Intelligence/Operations

Deceptively Simple Threat Detection

Virtual Breakout October 7, 2020 1:00 pm - 1:40 pm

Bookmark and Share

Tony Cole

There are fundamentally two ways to stop an attacker. One, to pursue them and the other, to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect all attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be early and accurate in the detection of threats. Globally, retail and hospitality providers are stealthily using virtualized deceptions fabrics to efficiently plant various decoys, bait, lures, and misdirections within their networks that are ambushing adversaries and tricking them into revealing themselves.

Learn how deception technology is used to gain rapid visibility and alerting of in-network attackers. Plus, gain insights into the value organizations are gaining:

  •  Reducing dwell time by 90% by detecting and denying lateral movement
  •  Improving privilege access management by derailing unauthorized AD queries
  •  Detecting and diverting credential theft and reuse
  •  Pinpointing and validation of insider threat activity (employees, suppliers, third parties)
  •  Securing Cloud Operations and malicious network activities
  •  Defending legacy devices and POS terminals from attack
  •  Detecting and hindering ransomware attacks
  •  Gathering of forensic evidence and adversary intelligence (IoCs/IoAs/TTPs) reducing triage time by 12X
  •  Enhancing EDR and SOAR solutions


Sponsored by:

Retail and Hospitality ISAC