Using Deception for Managing: the Risk of Targeted Attacks

We are clearly now living in a post-breach world where it is inevitable that advanced threat actors can and will get a foothold in any organization.  With a typical dwell time of 99 days (*FireEye 2018), earlier detection is now critical in containing the intruder before they have a chance to gain access to the Crown Jewels and expose the organization to undue risk.

The evening’s discussion will focus on the role of endpoint-based cyber deception in providing very early detection and hence reducing dwell time to days or even hours. We’ll also look at how deception techniques can be used to view your environment from the attackers perspective and use this information to identify and remove risk.

Join us and understand… The Reality of Breaches.