Ending Soon! Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off thru Dec 11 with OnDemand or vLive Training!

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

OUTMANEUVER the adversary-Alter your cyber terrain by making attacks more difficult

  • Thursday, December 5th, 2019 at 10:30 AM EST (15:30:00 UTC)
  • Dr. Abdul Rahman and Dave Shackleford
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

Sponsor

  • Fidelis Cybersecurity

You can now attend the webcast using your mobile device!

Overview

Join us for a series of 3 webinars where we provide you with strategies for outperforming, outmaneuvering and outfighting attackers so you can gain the decisive advantage in the cyber battle.

In order to defend against attackers, security teams need to first understand how attackers operate. Attackers will typically start by looking for weaknesses on the edge of the cyber terrain theyre attempting to breach. Once they find a foothold, they start moving laterally throughout the network, gaining higher levels of access as they move closer towards their target.

Interactive and dynamic deception techniques make it much more difficult for attackers to navigate the target cyber terrain. For example, deception allows security teams to alter the total amount of attack surface that is available to exploit. By deploying decoy assets, security teams can make 100 endpoints look like 1,000 endpoints or more. This slows down the adversary, opens a longer window to observe their methods, and provides new intelligence to outmaneuver similar, future attacks as well.

In this webcast, learn how to OUTMANEUVER attackers with deceptive countermeasures. 

For example:

  • Start with understanding attacker movements
  • Use these movements to trigger the decoy network and alert analysts
  • Increase the decoy attack surface to slow down, observe and catch attackers
  • Be ready for future similar attacks

Attackers target the low-hanging fruit. Attackers dont like spinning their wheels, and when they get tired of it, they move on to easier targets. Properly-deployed decoy technologies can make the opportunity time too costly for attackers looking for easy pickings to exploit.

Speaker Bios

Dr. Abdul Rahman

Dr. Rahman is the Chief Scientist at Fidelis and has been designing, deploying, and supporting big data cyber defense platforms for large customers over the last 10 years. Prior to Fidelis, Abdul worked as a contractor for the US Government and has also held senior leadership roles in his previous companies. He is currently on the Soteria Group LLC Board of Advisors. Key areas of specialty include the development of analytic capabilities to process petabytes of data for supervised and semi-supervised learning algorithms for pattern matching, correlation, and anomaly detection to support cyber security use cases using mathematical techniques and data science


Dave Shackleford

Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.