Turning Honeypots into an Offensive Toolkit to Secure Critical Assets

content2016

October 05, 2018

When you deal with critical information, wealth, complex infrastructures or you’re a product provider for casual users, you must be ready for worse and take proactive measures in order to defend and prevent incidents from damaging your network, assets, reputation or leak sensitive information. In any kind of attack, there is a short amount of time when attackers are most vulnerable. The talk will introduce several perspectives and also examples of how we can fingerprint, misguide or counter-attack the intruder. We will also discuss about IoT, honeypots, offensive approaches, APTs, malware and multi-layered counter-attacks and minimal requirements to protect your devices against “cyber slavery”.

PUBLICATIONS

The ecosystem of moving
October 05, 2018
Read
The Blockchain Built for Real World Apps
October 05, 2018
Read
Blockchain and cryptocurrency as a solution to betting industry problems
October 05, 2018
Read
АI and Blockchain in real life application with the highest security of all process
October 05, 2018
Read
How to build a community driven consensus and how it may lead the mass adoption of blockchain.
October 05, 2018
Read