The Art of Deception

Webinar Recording

In this webinar Todd and Srikant discuss a modern day security defense, which assumes that intruders have bypassed perimeter security and have made their way inside your network. With an assumed compromised security stance, organizations are modernizing their security strategies to go beyond perimeter security and to now focus on the real-time detection of inside-the-network threats.



                       

Todd Holloway                                      Srikant Vissamsetti
                                                         
Marvell Semiconductor                        Attivo Networks
 
Head of Information Security              SVP of Engineering 


In this webinar you will learn about

  • The role of deception in the kill chain 
  • Dynamic deception techniques and authenticity
  • Deception approaches and their pro’s and con’s
  • Use of deception for real-time actionable alerts
  • Threat Intelligence for remediation ​
  • How and why Marvell chose Attivo deception technology for threat detection
 

Original Recording Date: September 22, 2015

Additional Resources

Here are some resources that have recently been downloaded by other professionals. 

Introduction to Deception Technology and Attivo Networks

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform