How Threat Deception Fits Within Your Security Stack


George Insko, Director of Cybersecurity at the University of Kentucky and Carolyn Crandall, Chief Deception Officer / CMO at Attivo Networks, engage in a discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

This interactive and informative webinar will dive deeper into the following topics:

• How dynamic deception reduces dwell time and closes in-network detection gaps
• Deception use cases and detection alert examples 
• Deploying and operationalizing deception technology
• Why deception platforms are not created equal - how to evaluate them

To watch the webinar recording, please fill out the form and it will be sent to your email address.

Introduction to Deception Technology and Attivo Networks

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform