November 27, 2018 | Renaissance Dallas Hotel

SANS-Whitepaper
A SANS Whitepaper – Implementer’s Guide to Deception Technologies

Recorded SANS Webinar – Real World Implementation of Deception Technologies
Attacks, deception, scanning and discovery, AD account and credential hijacking, phishing, insider threat…

Deception Technology for Military and Defense
The U.S. DOD Cyber Strategy has evolved quickly to meet a broad mix of current and expected threats. Computer and network security controls and strategies are the foundation of new military warfighting strategies. They must be designed to gain and hold information...

Decoys, Lures & Breadcrumbs: Deception Technology Turns the Tables on Attackers
Using deception technology to throw off stealthy attackers from real assets, gather intelligence about how they operate…

Cybersecurity Transformation Summit 2020
June 25 – 2020 | Virtual Conference
Gain Critical Knowledge to Address Cybersecurity Mission Challenges Forward.

Google Cloud Next 2020
April 6 – 8 | San Francisco, CA
3 days of networking, learning, and collaboration

Insider Threat Summit 2020
MARCH 11 – 12, 2020 | California
To better understand security challenges in order to better defend against insider threats.

AFCEA West
March 2 – 3 | San Diego
Senior military and government (or Department of Defense) officials will discuss the challenges they face and how industry can help address them.

ShadowPlex Crowdstrike Solution Brief
Autonomous Deception
with novel capabilities enabled by Crowdstrike Falcon integration

Recorded webinar – Fact and Fiction In Advanced Threat Detection
Current data threat detection landscape, assessed how data threat protection can be used to aid organizations…