Posted on
in Presentations
Adversaries have ideal victims that help increase their ROI on the attacks they create. Studying the ideal victim and leveraging deception and honeypots can help to stop adversaries from achieving their mission. This talk will cover adversary obsession techniques for identifying the ideal victim quickly and building a security program tailored to a company’s adversary interest.
Learning Objectives:
1: Understand ideal victims and victimology.
2: Find tools and techniques for changing the game on how to stop adversaries.
3: Prevent bad guys from achieving their mission.
Pre-Requisites:
Basic knowledge of deception and threat intelligence.
Learning Objectives:
1: Understand ideal victims and victimology.
2: Find tools and techniques for changing the game on how to stop adversaries.
3: Prevent bad guys from achieving their mission.
Pre-Requisites:
Basic knowledge of deception and threat intelligence.
Hackers & Threats
threat management threat intelligence hackers & threats deception-based security behavioral analytics
Topic
Hackers & Threats
Subtopic
threat management
threat intelligence
hackers & threats
deception-based security
behavioral analytics
Share With Your Community