Industry guidelines for cyber-defence require breach defense capabilities. Topics like honeypots, security sensors and continuous monitor come into play. However, what if you could combine all of these techniques? This talk will provide a guideline for developing end-to-end honey networks combining different breach defence techniques. Topics cover open source and enterprise options for any size network
Presenters