How Threat Deception Fits Within Your Security Stack
George Insko, Director of Cybersecurity at the University of Kentucky and Carolyn Crandall, Chief Deception Officer / CMO at Attivo Networks, engage in a discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.
This interactive and informative webinar will dive deeper into the following topics:
• How dynamic deception reduces dwell time and closes in-network detection gaps
• Deception use cases and detection alert examples
• Deploying and operationalizing deception technology
• Why deception platforms are not created equal - how to evaluate them