BoF: Driving Deception with Adversary Behaviors


Posted on in Presentations

As adversaries interact with the environment, they reveal their own behavioral weaknesses. These weaknesses can be exploited by the defender using deception technology. We will discuss how organizations can start using adversary behavior as a driver behind their defensive strategy. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Maretta Morovitz

Facilitator

MITRE Engage Lead, The MITRE Corporation

Hackers & Threats

hackers & threats network security security intelligence intrusion prevention/detection threat intelligence


Topic

Subtopic


Share With Your Community