November 27, 2018 | Renaissance Dallas Hotel

https://www.evanta.com/ciso/summits/dallas/1676#overview

The Reserve Bank of India – Cyber Security Framework

The Reserve Bank of India – Cyber Security Framework

Mandating Robust Attack Detection, Response, and Recovery The cybersecurity guidelines issued by the Reserve Bank of India (RBI) in 2016 serve as a stark reminder of the need for robust cyber threat detection and response. Although the RBI released extensive IT...

Deception and Compliance: The Co-Existence Conundrum

Deception and Compliance: The Co-Existence Conundrum

In our recent blog, we looked at using Deception solutions to satisfy compliance regulations, in particular controls which are intended to promote active discovery of anomalous behavior. In this blog we’re switching gears and looking at a different aspect of...

Tunneling for Network Deceptions

Tunneling for Network Deceptions

Patent Awarded to Acalvio Acalvio was awarded U.S. Patent No. 20,170,310,706, titled “Tunneling For Network Deceptions”. This patent forms the basis of the Deception Farms® architecture. This blog goes a little deep into the patent to talk about what the patented...

Know Your Adversary, Before They ATT&CK

Know Your Adversary, Before They ATT&CK

The Cyber Kill Chain If you’re reading this blog, you likely know the basics of the cyber kill chain. You might even be able to name a few of the seven stages in the kill chain, which lays out the steps adversaries take to attack and exploit their victims. Where you...