Controlling the Narrative – an Introduction to Cyber Deception

Thank you Bordeaux, and thank you to the organizers of BSidesBDX for giving the change to dicuss one of my favorite current topics – cyber deception.

Unfortunately, due to a technical error, the last 5 minutes of the recording are lost, but they were mostly the summary and the Q&A.

Bottom line – one the best defense strategies we can have is to make our honeypots look like any other machine in the network, so that adversaries don’t know that they are in a honeypot, but also make our endpoints look like badly executed honeypots, to make them unappealing for attackers.