It's very likely you've heard of honeypots, but unlikely you've considered deploying them in your environment for a number of reasons. This presentation will change everything. David Greenwood will walk you through a brief history of cyber deception and show how you can turn simple deception campaigns into valuable threat intelligence.
We'll focus on:
NOTE: A valid email address is required to receive your requested asset.