Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading Events

« All Events

  • This event has passed.
Event Series Event Series: Blue Team Summit 2023

Blue Team Talk: Who Goes There? Actively Detecting Intruders With Honeytokens

August 23 @ 1:00 pm – 1:30 pm EDT

Intrusion detection works best when you can discover the attacker while they are still in the system. Finding out after the fact does little to protect your systems and your data. Ideally, you would want to set an alarm that an attacker would trigger while limiting the damage to your environment. We know from many recent breaches that attackers commonly try to expand their foothold in a system by finding and exploiting hardcoded credentials in environments they have accessed. We can use these behavioral patterns to our advantage by engaging in defensive cyber deception.

Register Now!

Clicking on the button above will take you
to our registration form on Cvent.

Pricing:

Free per person
Tags
Blue Team, Blue Team Summit 2023, Blue Team Talk: Who Goes There? Actively Detecting Intruders With Honeytokens, Dwayne McDaniel, Honeytokens, Summit Talk, Track 2
Event Categories:
Live, Virtual

Location:

Online

  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live

You might already be familiar with the concept of honeypots, false systems, or networks meant to lure and ensnare hackers. There is a subclass of honeypots that require almost none of the overhead, are simple to deploy, are used by many industries, and lure attackers to trigger alerts while they are trying to gain further access. The industry has arrived at the term honeytoken for this branch of cybersecurity tooling.


Dwayne McDaniel
Dwayne McDaniel

Dwayne McDaniel has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge, and he has done so by giving talks at over a hundred events worldwide. Dwayne currently lives in Chicago. Outside of tech, he loves karaoke, live music, and performing improv.


Related Events

  • Secure Ideas - Introduction to PCI (PCI 101)

    Introduction to PCI (PCI 101)

    October 3 @ 12:00 pm – 4:00 pm EDT Event Series
  • Secure Ideas - Professionally Evil CISSP Mentorship

    Professionally Evil CISSP Mentorship Program

    October 3 @ 2:00 pm – 4:00 pm EDT Event Series
  • Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation

    October 4 @ 12:00 pm – 4:00 pm EDT Event Series

Event Navigation

  • « Blue Team Talk: Cloud Security: Why the Endpoint Still Matters
  • Blue Team Talk: Why Your Company Needs an AI Policy Right Now »
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme