Using Deception Technology To Close Your Detection Gaps
Independent law firms and legal departments all need to protect their intellectual property from theft and to know if critical files are accessed without authorization. In this session, we will share insights into why deception technology has become a legal sector preferred security control for the early detection and identification of in-network threats that have bypassed prevention security controls and for its reliable alerting on insider security policy violations. Discussion topics include deception use cases for IP and case file protection, insight into adversary intelligence gathering and examples of how automation is used to accelerate incident response. This session is for legal organizations of all sizes and maturity, which are seeking to enhance their detection capabilities, gain attack path visibility and enrich insider threat programs.
Presented by: Joseph Salazar, Technical Deception Engineer, Attivo Networks