Learn about cyber deception and how to implement it, from the basics of the technology and operational requirements and gotchas around it, to pain points it can solve and business value it can bring to the table.
Learn what you need from how to gain visibility and counter responder/Pass-the-Hash, to building complex deception stories and establishing a program.