• Categories

  • Format

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

RSA 2020 – Attivo Networks Deception-Based Threat Detection

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks deception technology and all that it offers.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

eBook: Deception-Based Threat Detection – Shifting Power to the Defenders

This ebook provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats.

ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™): A Definitive Market Guide to Deception Technology

This research from EMA  highlights how enterprises are using deception technology, the value they see in it, the challenges they have with it, and how they intend to use it in the future.

Understanding Deception Technology

This document explains the role deception has historically played in attack and defense as well as highlights why it has become a necessary part of a modern cybersecurity stack. Deception technology is becoming a core necessity in any security architecture. 

Attivo Networks® ThreatDefend™ Platform and the ISO/IEC 27000 Family of Standards

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27000 family of standards helps organizations keep information assets secure. 

Behind the Mask with Alan Commike and Carolyn Crandall at RSAC 2019

Accomplished cyber security technology leader, Alan Commike, and Chief Deception Officer, Carolyn Crandall, sit down to discuss the benefits of Deception Technology at RSA 2019

Carolyn Crandall and Lance Spitzner at RSAC 2019

Carolyn Crandall, Attivo Networks Chief Deception Officer, and Lance Spitzner, founder of the honeynet project, discuss the evolution of deception technology at RSAC 2019 in Broadcast Alley.

Cyber Deception: How To Build A Program

Geoff Hancock has been in cybersecurity for 27 years. He has worked in the military, intelligence community, civilian agencies and corporations, conducting cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group, where he heads up a team of cyber deception and intelligence analysts providing instruction and program operations. Understand the value of having a cyber deception plan in place and learn the information you need to know to get one started in this white paper.

Attivo Networks® ThreatDefend Platform and the NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the US can assess and improve their ability to prevent, detect, and respond to cyberattacks. This white paper explores the ways in which the Attivo Networks ThreatDefend Deception and Response Platform provides extensive support to meet the guidance set forth by the NIST Cybersecurity Framework.

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Attivo Networks Threat Deception to Comply with the Reserve Bank of India Cybersecurity Framework

This whitepaper explains how the Attivo Networks® ThreatDefendTM platform enables organizations to meet specific compliance issues specified in the RBI CS Framework, along with numerous other requirements. This paper further explains how the Attivo Networks solution provides comprehensive detection and response to organizations under threat.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

2019 TAG Cyber Security Handbook and Reference Guide

Attivo Networks is a distinguished vendor in the annual 2019 TAG Cyber Security Annual – Outlook for Fifty Cyber Security Controls. The Annual is a practical handbook and reference guide, designed for the working cybersecurity professional, created from expert advisory research based on discussions, interviews, website material, and other information.


9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

RSA 2020 – Attivo Networks Deception-Based Threat Detection

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks deception technology and all that it offers.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

eBook: Deception-Based Threat Detection – Shifting Power to the Defenders

This ebook provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats.

ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™): A Definitive Market Guide to Deception Technology

This research from EMA  highlights how enterprises are using deception technology, the value they see in it, the challenges they have with it, and how they intend to use it in the future.

Understanding Deception Technology

This document explains the role deception has historically played in attack and defense as well as highlights why it has become a necessary part of a modern cybersecurity stack. Deception technology is becoming a core necessity in any security architecture. 

Attivo Networks® ThreatDefend™ Platform and the ISO/IEC 27000 Family of Standards

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27000 family of standards helps organizations keep information assets secure. 

Behind the Mask with Alan Commike and Carolyn Crandall at RSAC 2019

Accomplished cyber security technology leader, Alan Commike, and Chief Deception Officer, Carolyn Crandall, sit down to discuss the benefits of Deception Technology at RSA 2019

Carolyn Crandall and Lance Spitzner at RSAC 2019

Carolyn Crandall, Attivo Networks Chief Deception Officer, and Lance Spitzner, founder of the honeynet project, discuss the evolution of deception technology at RSAC 2019 in Broadcast Alley.

Cyber Deception: How To Build A Program

Geoff Hancock has been in cybersecurity for 27 years. He has worked in the military, intelligence community, civilian agencies and corporations, conducting cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group, where he heads up a team of cyber deception and intelligence analysts providing instruction and program operations. Understand the value of having a cyber deception plan in place and learn the information you need to know to get one started in this white paper.

Attivo Networks® ThreatDefend Platform and the NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the US can assess and improve their ability to prevent, detect, and respond to cyberattacks. This white paper explores the ways in which the Attivo Networks ThreatDefend Deception and Response Platform provides extensive support to meet the guidance set forth by the NIST Cybersecurity Framework.

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Attivo Networks Threat Deception to Comply with the Reserve Bank of India Cybersecurity Framework

This whitepaper explains how the Attivo Networks® ThreatDefendTM platform enables organizations to meet specific compliance issues specified in the RBI CS Framework, along with numerous other requirements. This paper further explains how the Attivo Networks solution provides comprehensive detection and response to organizations under threat.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

2019 TAG Cyber Security Handbook and Reference Guide

Attivo Networks is a distinguished vendor in the annual 2019 TAG Cyber Security Annual – Outlook for Fifty Cyber Security Controls. The Annual is a practical handbook and reference guide, designed for the working cybersecurity professional, created from expert advisory research based on discussions, interviews, website material, and other information.