Главная
Study mode:
on
1
Intro
2
The Art of War
3
Introduction
4
Three Different States of Deception
5
Deception Techniques Today
6
Kill Chain Framework
7
Cest la vie
8
Nonsecurity related industries
9
Where can we apply deception
10
Strategic planning
11
Three main things
12
The Russian School of Thought
13
Applications of Honeypot
14
Layers of Deception
15
The Answer
16
Critical Infrastructure
17
Wrapping Up
18
Resources
Description:
Explore advanced deception techniques in cybersecurity beyond traditional honeypots in this 46-minute conference talk from APPSEC Cali 2018. Delve into the nuanced aspects of cyber conflict, including offensive deception and attribution challenges. Learn how to adapt military and political deception strategies for security programs. Examine the various states of deception, the Kill Chain Framework, and applications in critical infrastructure. Gain insights from non-security industries and discover how to implement layered deception tactics. Led by Robert Wood, Chief Security Officer at SourceClear, this talk provides valuable resources and strategic planning approaches to enhance your organization's cybersecurity posture.

Applied Deception Beyond the Honeypot - Moving Past 101

OWASP Foundation
Add to list