Главная
Study mode:
on
1
Intro
2
Cat And Mouse Game
3
Basic Attack Conept
4
Endpoint and Branch Network
5
Security Capabilities
6
NetFlow = Visibility
7
Why Unsampled NetFlow?
8
Phantom Network Zones Concept
9
Phantom Network Alarm Examples
10
Subnets Designed for Threat Detectio
11
Honeypot Personas
12
Honeypot Usage
13
Beware - Honeypot Recon
14
Combine Phantom Networks, Honeypots +
15
Tuning Your SIEM
16
Keep it Simple
Description:
Explore advanced cyber-defense strategies in this 30-minute RSA Conference talk by Joseph Muniz, Security Architect and Researcher at Cisco. Dive into the concept of honey networks, combining honeypots, security sensors, and continuous monitoring techniques for comprehensive breach defense. Learn about open-source and enterprise options suitable for networks of all sizes. Discover how to implement phantom network zones, design subnets for threat detection, create honeypot personas, and effectively tune your SIEM. Gain insights into unsampled NetFlow for enhanced visibility and understand the potential pitfalls of honeypot reconnaissance. Master the art of integrating multiple defense techniques to create a robust, end-to-end honey network that meets industry guidelines for cyber-defense capabilities.

You See Honey, I See Beehive - Developing Honey Networks

RSA Conference
Add to list
0:00 / 0:00