You See Honey, I See Beehive: Developing Honey Networks


Posted on in Presentations

Industry guidelines for cyber-defence require breach defense capabilities. Topics like honeypots, security sensors and continuous monitor come into play. However, what if you could combine all of these techniques? This talk will provide a guideline for developing end-to-end honey networks combining different breach defence techniques. Topics cover open source and enterprise options for any size network

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>


Share With Your Community