Confusion and Deception: New Tools for Data Protection

Posted on in Presentations

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce the value of any data ultimately accessed—and shift the risk equation.

Craig Astrich

Director, Deloitte & Touche LLP

Daniel Frank

Security Researcher, F5 Networks

Protecting Data & Applied Crypto Analytics, Intelligence & Response

data security hackers & threats security analytics data loss prevention



Share With Your Community