Webinar-Under The Hood Of Deception Technologies

What will you learn:

  • How is deception technology different from honeypots ?
  • Deception v/s EDR, UEBA and NTA
  • A hacker’s view of deception across the kill-chain
  • Key technology capabilities or key components of deception technology

 

About Speaker:

sahir-hidayatullah-ceo-smokescreen-.originalhttps://www.firecompass.com/wp-content/uploads/2017/09/sahir-hidaya... 150w,

@sahirh

 
 

  • Sahir started his security career as an ethical hacker and is a serial cybersecurity entrepreneur. His companies have investigated several high-profile data breaches with clients that include critical national infrastructure, global financial institutions and Fortune 500 companies. His work has been featured as a cover story in Fortune India magazine, and his thoughts on technology risk management appear regularly in print and television media.

Views: 23

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service