The concept of deception has been leveraged by cyber-defenders for many years, but maturing technologies have put a new twist on the classic honeypot approach. This session will take a deep dive into dynamic deception, demonstrating how to leverage the Python programming language with the Twisted networking framework to deceive attackers and better protect the Industrial Internet of Things.
1: Learn about the current status quo of IIoT and how it impacts businesses.
2: Explore deception-based security techniques.
3: Leave with resources for implementing deception-based security.
critical infrastructure deception-based security intrusion prevention/detection operational technology (OT Security) Internet of Things
Share With Your Community