Active Defense & Deception , Next-Generation Technologies & Secure Development

Addressing the Visibility Challenge With Deception

Carolyn Crandell of Attivo Networks on Using Deception to Improve Detection
Carolyn Crandall, chief deception officer and chief marketing officer, Attivo Networks

It's becoming increasing important to detect adversaries that have bypassed your security controls and moved laterally in your environment, says Carolyn Crandall of Attivo Networks, who describes the role deception can play.

See Also: Reduce Dwell Time of Advanced Threats With Deception

"Attackers can be in an out of your environment in 12 hours. Deception is able to put traps and lures into the network in attract the attackers inside the network into engaging so that defenders can quickly shut them down," she says.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Crandall discusses:

  • Going beyond deflection to pick up tactics, techniques and procedures and indicators of compromise;
  • Recommendations for implementing deception capabilities;
  • Innovations and developments in deception.

Crandall is the chief deception officer and chief marketing officer at Attivo Networks.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.