Active Defense & Deception
Category

Active Defense & Deception

Active defense technologies and strategies encompass a spectrum of approaches with a common goal. These include gray hat activities - including deception, beacons, hunting, information sharing and others.

Entire spectrum of active defense technologies and strategies, gray hat activities, including deception, beacons, hunting, information sharing et al.

Addressing the Root Cause: Using Deception to Solve Practical Security Problems

Don Gray - PacketViper  •   • 

Start this Session

The Art of Deception for Advanced Threat Detection

Tony Cole - Attivo , Rocco Grillo - Alvarez & Marsal , Ajoy Kumar - Depository Trust & Clearing Corporation  •   • 

Start this Session

Fraud Detection: An Introduction to Deception

Session In Development  • 

Dr. Matthew Kane - Solaris Intelligence  •   • 

Preview this Session

Targeted Attacks: Proactive Prevention Using Deception Technologies

Prakash Padariya - GE India Technology Center  •   • 

Start this Session

The Art of Deception for Advanced Threat Detection in Healthcare Organizations

Session In Development  • 

Carolyn Crandall - Attivo  •   • 

Preview this Session

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Tom Field - ISMG , Tom Kellermann - Carbon Black , Christopher Pierson - Viewpost , David Pollino - Bank of the West (BNP Paribas)  •   • 

Start this Session

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Todd Carroll - CybelAngel , Christopher Pierson - Viewpost , Robert Villanueva - Q6 Cyber  •   • 

Start this Session

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Tom Kellermann - Carbon Black , Richard Parry - Parry Advisory; former Risk Management Executive, JPMorgan Chase , Christopher Pierson - Viewpost  •   • 

Start this Session

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Jimmy Lummis - Georgia Institute of Technology , Allen O'Rourke - Womble Carlyle Sandridge & Rice, LLP , Christopher Pierson - Viewpost  •   • 

Start this Session

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Elvis Chan - San Francisco Division, FBI , Richard Parry - Parry Advisory; former Risk Management Executive, JPMorgan Chase , Michael Zweiback - Zweiback Fiset & Coleman LLP  •   • 

Start this Session

Wolves Amongst Sheep - Defeating Targeted Attacks With Deception

Archived Session  • 

Sahir Hidayatullah - Smokescreen Technologies Pvt. Ltd.  •   • 

Start this Session

Session Contributors

Ajoy Kumar

Executive Director, Depository Trust & Clearing Corporation

Read Bio
Allen O'Rourke

Cybersecurity Attorney, Womble Carlyle Sandridge & Rice, LLP

Read Bio
Carolyn Crandall

Chief Deception Officer, Attivo

Read Bio
Christopher Pierson

Chief Security Officer and General Counsel, Viewpost

Read Bio
David Pollino

Chief Cybersecurity Officer, Bank of the West (BNP Paribas)

Read Bio
Don Gray

Chief Technology Officer, PacketViper

Read Bio
Dr. Matthew Kane

CEO, Solaris Intelligence

Read Bio
Elvis Chan

Supervisory Special Agent, San Francisco Division, FBI

Read Bio
Jimmy Lummis

Associate Director of Cyber Security, Georgia Institute of Technology

Read Bio
Michael Zweiback

Partner and Co-Founder, Zweiback Fiset & Coleman LLP

Read Bio
Prakash Padariya

Head - Information Security, GE India Technology Center

Read Bio
Richard Parry

Principal, Parry Advisory; former Risk Management Executive, JPMorgan Chase

Read Bio
Robert Villanueva

Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Read Bio
Rocco Grillo

Managing Director, Alvarez & Marsal

Read Bio
Sahir Hidayatullah

Co-founder and CEO, Smokescreen Technologies Pvt. Ltd.

Read Bio
Todd Carroll

CISO and VP of Cyber Operations, CybelAngel

Read Bio
Tom Field

Senior Vice President, Editorial, ISMG

Read Bio
Tom Kellermann

Chief Cybersecurity Officer, Carbon Black

Read Bio
Tony Cole

Chief Technology Officer, Attivo

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.