Detecting Intruders with Honeytokens - Who Goes There?
Offered By: Conf42 via YouTube
Course Description
Overview
Explore the world of honeytokens and their role in detecting intruders in this informative conference talk from Conf42 DevSecOps 2023. Delve into the history of cyber deception and learn about various honeytoken options, including open-source DIY solutions and commercial off-the-shelf products. Discover best practices for implementing honeytokens effectively and gain insights into recent high-profile security breaches. Understand how attackers behave and what they're after, with a focus on the state of secrets sprawl in 2023. Follow along as the speaker demonstrates a real-time honeytoken deployment and shares valuable conclusions about this powerful cybersecurity technique.
Syllabus
intro
preamble
about dwayne
let's deploy something real quick
attackers want your credentials
uber breach - september 2022
astrazeneca - november 2022
circleci - january 2023
hardcoded credentials
we know how attackers behave
what attackers want
in the 2023 of the state of secrets sprawl
a brief history of cyber deception
what is a honeytoken?
honeytoken options
open source - the diy route
commercial options - off the shelf
honeytoken best practices
let's check on our honeytoken from earlier...
in conclusion
honeytoken options
thanks, reach out!
Taught by
Conf42
Related Courses
Network SecurityRochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cyber Security
CEC via Swayam