Listen to Chris Cheyne (CTO, SecurityHQ), Nilesh Burghate (Head – Global SOC, SecurityHQ), and Sahir Hidayatullah (CEO, Smokescreen), as they explore how attackers target networks before the breach, and how you can use deception technology to turn their playbook against them.

What You Will Learn

Deception and Private Threat Intel.
How Internet-facing decoys can be used to pre-empt attacks.
The attacker’s view of deception, via a live demo of what happens when attackers find and interact with Internet-facing decoys.

While deception is mostly used for in-network threat detection, Internet-facing decoys can be used to generate private threat intelligence that act as an early warning system. These decoys heuristically engage with targeted threats against your organisation, while ignoring random Internet scans.