Posted on
in Presentations
Honeypots are an effective way to lure attackers into delivering malware samples and showing tactics, techniques and procedures (TTPs). Let’s discuss the next steps to take with these systems: which protocol should we support (RDP, SCADA, web), ease of secure deployment, automation, multi-machine environments, interactivity (full vs. low) and increasing the collaboration with open or shared source.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community