YoVDO

Detecting Intruders with Honeytokens - Who Goes There?

Offered By: Conf42 via YouTube

Tags

Cybersecurity Courses DevSecOps Courses Intrusion Detection Courses Data Breaches Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of honeytokens and their role in detecting intruders in this informative conference talk from Conf42 DevSecOps 2023. Delve into the history of cyber deception and learn about various honeytoken options, including open-source DIY solutions and commercial off-the-shelf products. Discover best practices for implementing honeytokens effectively and gain insights into recent high-profile security breaches. Understand how attackers behave and what they're after, with a focus on the state of secrets sprawl in 2023. Follow along as the speaker demonstrates a real-time honeytoken deployment and shares valuable conclusions about this powerful cybersecurity technique.

Syllabus

intro
preamble
about dwayne
let's deploy something real quick
attackers want your credentials
uber breach - september 2022
astrazeneca - november 2022
circleci - january 2023
hardcoded credentials
we know how attackers behave
what attackers want
in the 2023 of the state of secrets sprawl
a brief history of cyber deception
what is a honeytoken?
honeytoken options
open source - the diy route
commercial options - off the shelf
honeytoken best practices
let's check on our honeytoken from earlier...
in conclusion
honeytoken options
thanks, reach out!


Taught by

Conf42

Related Courses

Network Security
Rochester Institute of Technology via edX
Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Information security - IV
Indian Institute of Technology Madras via Swayam
Cyber Security
CEC via Swayam