What will you learn:
- How is deception technology different from honeypots ?
- Deception v/s EDR, UEBA and NTA
- A hacker’s view of deception across the kill-chain
- Key technology capabilities or key components of deception technology
- Sahir started his security career as an ethical hacker and is a serial cybersecurity entrepreneur. His companies have investigated several high-profile data breaches with clients that include critical national infrastructure, global financial institutions and Fortune 500 companies. His work has been featured as a cover story in Fortune India magazine, and his thoughts on technology risk management appear regularly in print and television media.