Deploying Deceptive Systems: Luring Attackers from the Shadows

DerbyCon 8.0 - Evolution

Presented by: Kevin Gennuso
Date: Saturday October 06, 2018
Time: 12:00 - 12:50
Location: Kentucky E
Track: Track 3

Assume the network is compromised" has been a popular mantra in information security for years now. So how do defenders operate in such an environment? Honeypots and honeytokens that are well-planned and strategically-placed can enhance any organization's threat detection capability. This talk will demonstrate a few of the various free, open-source solutions available as well as a strategic plan for deploying them.

Kevin Gennuso

Kevin is a security architect/manager and part time packet mangler. He has nearly 20 years of experience in both the offensive and defensive sides of information security, and has done work for a number of organizations across the technology, healthcare, finance, and retail sectors.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats