The subject of cyber deception is somewhat controversial. While everyone who understands it thinks it is amazing, it is also often considered a "nice-to-have" rather than a "must-have" component of a typical security program. Is this perspective justified?
In this presentation, we will discuss exactly what cyber deception is and is not. We will talk about how it works with, enhances, and is enhanced by traditional security controls such as firewalls, endpoint security, and intrusion detection. We will also discuss how cyber deception works with more advanced security concepts and architectures such as zero trust, cyber threat intelligence, adversary emulation, and purple team activities. By the end of the webinar, you will be able to decide for yourself whether cyber deception should become a part of your information security program.