Skip to content

Commit

Permalink
Create Who-Goes-There-Actively-Detecting-Intruders-With-Cyber-Decepti…
Browse files Browse the repository at this point in the history
…on-Tools.md
  • Loading branch information
Alone2671 authored Dec 17, 2023
1 parent 25fdf77 commit 033ed8a
Showing 1 changed file with 41 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
---
title : "Who Goes There? Actively Detecting Intruders With Cyber Deception Tools"
track : Governance
project : Risk and Governance
type : working-session
topics :
featured :
event : mini-summit
when_year : 2024
when_month : Jan
when_day : Fri
when_time : WS-15-16
hey_summit :
session_slack:
#status : draft
description :
banner :
organizers :
- Dwayne McDaniel

youtube_link :
zoom_link :
---

## About this session
Intrusion detection works best when you can discover the attacker while they are still in the system. Finding out after the fact does little to protect your systems and your data.

Ideally, you would want to set an alarm that an attacker would trigger while limiting the damage to your environment.

We know from many recent breaches that attackers commonly try to expand their foothold in a system by finding and exploiting hardcoded credentials in environments they have accessed. We can use these behavioral patterns to our advantage by engaging in defensive cyber deception.

You might already be familiar with the concept of honeypots, false systems, or networks meant to lure and ensnare hackers. There is a subclass of honeypots that require almost none of the overhead, are simple to deploy, are used by many industries, and lure attackers into triggering alerts while they are trying to gain further access. The industry has arrived at the term honeytoken for this branch of cybersecurity tooling.

Takeaways:
- Analysis of recent breaches for common attack behaviors
- A history of cyber deception and the evolution of honeypots in defensive strategies.
- Understanding how honeytokens work
- Maximizing the impact of honeytokens

### Publications:
https://blog.gitguardian.com/honeytokens-protect-your-holy-grail/

0 comments on commit 033ed8a

Please sign in to comment.