Главная
Study mode:
on
1
Intro
2
Backstory
3
What this talk is about
4
DISCLAIMER
5
Outline
6
What is threat intelligence?
7
TI Phases
8
Collection
9
Data / Event Correlation
10
SIEM
11
How do we increase accuracy?
12
What's a honeypot?
13
Common Problems
14
Low Interaction Honeypots
15
Medium Interaction Honeypots
16
High Interaction Honeypots
17
Why High Interaction for TI?
18
Making It Count
19
They MUST look legit
20
Adding Production Value
21
HI Honeypot Considerations
22
Considerations With Virtualization
23
Cloud Considerations
24
Examples of Canaries
25
Market Watch
26
Recap
27
Conclusion
28
Next Development
29
References
30
People to Follow
Description:
Explore the deployment of honeypots for gathering actionable threat intelligence in this conference talk from Circle City Con 2015. Learn about different types of honeypots, their interaction levels, and how to increase accuracy in threat intelligence collection. Discover the importance of making honeypots look legitimate, adding production value, and considerations for virtualization and cloud environments. Gain insights into market watch examples, canaries, and future developments in the field. Follow along as the speaker covers threat intelligence phases, SIEM integration, and common problems encountered when using honeypots for cybersecurity purposes.

Deploying Honeypots to Gather Actionable Threat Intelligence

Add to list
0:00 / 0:00