No product will make us secure, estimates are since 2019 more than $100 Billion a year is spent on cyber security products, yet we had many data breaches, we are losing the battle, so it is time for another approach. Organizations need to start with the foundations of defense in preparation for deploying deception and taking control of your networks.
The recent wave of ransomware attacks against Pipeline companies and others shows that we have to look at the fundamentals. There is no reason in a modern network for a ransomware attack to take out the entire enterprise network, at the most it can take out a machine and even an entire network segment, but it should never take out the enterprise, the only way this can happen is poor network design! We have to rethink how we do security, this will take a concentrated effort at using the proven methods of segmentation and isolation. No matter how much “security” is put in place, the reality is we are running our data on protocols that were developed many years ago when the Internet was small and as a result of this, these protocols are based on the principle of trust; therefore, to truly defend we need to modify these protocols. The concept is, if the protocols can be changed then the result of this will be frustration and confusion for the adversary.
In this webinar defensive concepts will be explored and an introduction to the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control and they only need to find one-way in. This webinar will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks because we have designed it and this webinar will show you how to take advantage of that.