Webinar-Under The Hood Of Deception Technologies

What will you learn:

  • How is deception technology different from honeypots ?
  • Deception v/s EDR, UEBA and NTA
  • A hacker’s view of deception across the kill-chain
  • Key technology capabilities or key components of deception technology

 

About Speaker:

sahir-hidayatullah-ceo-smokescreen-.original

@sahirh

 
 

  • Sahir started his security career as an ethical hacker and is a serial cybersecurity entrepreneur. His companies have investigated several high-profile data breaches with clients that include critical national infrastructure, global financial institutions and Fortune 500 companies. His work has been featured as a cover story in Fortune India magazine, and his thoughts on technology risk management appear regularly in print and television media.
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform