In this webcast, we will explore how to effectively use cyber deception to hunt advanced threat actors and other threats. We will discuss the use of incident response automation, and specifically how deception orchestration can be used to deploy successful deception campaigns.
Starting from the initial reconnaissance phase, cyber deception technology takes advantage of the critical stages through which all attackers must pass (infiltration and lateral movement) and creates a controlled path for them to follow. The most effective cyber deception solutions allow the organization to create deception stories and realistic environments for hunting cyber attackers.
Deception orchestration takes this to the next level by integrating incident response automation into the existing deception platform.
We will also introduce Cymmetria's community edition of their deception solution, MazeRunner, freely available for download. Webcast attendees will come away with an understanding of what cyber deception is, how to effectively use it to hunt threats, how MazeRunner can be effectively deployed, as well as how deception orchestration integrates with incident response automation.