ICS/SCADA Honeypot Pros & Cons

  • Webcast Aired Monday, 25 Nov 2013 1:00PM EST (25 Nov 2013 18:00 UTC)
  • Speaker: Brent Huston
Honeypots have become a hot topic around information security circles days, with increasing interest in both IT and OT deployments. How would a honeypot add to your security program? What are the best ideas for deployment? What are the challenges you might face? What if the attacker gets mad? What about entrapment? All of these questions and more will be explored and discussed with regards to employing honeypots in regards to ICS. Whether your organization is a utility looking to better detect threats from the field or a manufacturer looking to safeguard the production line, you will come away with a definite understanding of how and when a honeypot might be useful. The speaker will also prepare you for the inevitable push back and objections and even make a case for when honeypots might be a bad idea. If you want to add a little sweet taste to your security capabilities, this web session will give you the foundation to build upon