Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.

Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.

In this talk, John will cover some of the more entertaining and enlightening examples of a year of running cyber attribution and deception campaigns.The goal of this presentation is to equip the attendees with real-life examples of how these technologies work and how they can provide immediate value to an organization.He will also provide free tools and techniques that can be implemented immediately upon returning to work.

Presented by