Posted on
in Presentations
As adversaries interact with the environment, they reveal their own behavioral weaknesses. These weaknesses can be exploited by the defender using deception technology. We will discuss how organizations can start using adversary behavior as a driver behind their defensive strategy. This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
Hackers & Threats
hackers & threats network security security intelligence intrusion prevention/detection threat intelligence
Share With Your Community