OUTMANEUVER the adversary-Alter your cyber terrain by making attacks more difficult

  • Thursday, 05 Dec 2019 10:30AM EST (05 Dec 2019 15:30 UTC)
  • Speakers: Dave Shackleford, Dr. Abdul Rahman

Join us for a series of 3 webinars where we provide you with strategies for outperforming, outmaneuvering and outfighting attackers so you can gain the decisive advantage in the cyber battle.

In order to defend against attackers, security teams need to first understand how attackers operate. Attackers will typically start by looking for weaknesses on the edge of the cyber terrain they 're attempting to breach. Once they find a foothold, they start moving laterally throughout the network, gaining higher levels of access as they move closer towards their target.

Interactive and dynamic deception techniques make it much more difficult for attackers to navigate the target cyber terrain. For example, deception allows security teams to alter the total amount of attack surface that is available to exploit. By deploying decoy assets, security teams can make 100 endpoints look like 1,000 endpoints or more. This slows down the adversary, opens a longer window to observe their methods, and provides new intelligence to outmaneuver similar, future attacks as well.

In this webcast, learn how to OUTMANEUVER attackers with deceptive countermeasures. '

For example:

  • Start with understanding attacker movements
  • Use these movements to trigger the decoy network and alert analysts
  • Increase the decoy attack surface to slow down, observe and catch attackers
  • Be ready for future similar attacks

Attackers target the low-hanging fruit. Attackers don't like spinning their wheels, and when they get tired of it, they move on to easier targets. Properly-deployed decoy technologies can make the opportunity time too costly for attackers looking for easy pickings to exploit.