Posted on
in Presentations
Industry guidelines for cyber-defence require breach defense capabilities. Topics like honeypots, security sensors and continuous monitor come into play. However, what if you could combine all of these techniques? This talk will provide a guideline for developing end-to-end honey networks combining different breach defence techniques. Topics cover open source and enterprise options for any size network
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community