Trending...
- "Leading From Day One: The Essential Guide for New Supervisors" Draws from 25+ Years of International Management Experience - 281
- NoviSign Sponsoring VARTECH 2025 - the B2B IT channel's #1 event - 262
- New Slotozilla Project Explores What Happens When the World Goes Silent - 222
FREMONT, Calif. - Californer -- Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a virtual breakout session at the 2020 RH-ISAC Cyber Intelligence Summit, titled: "Deceptively Simple Threat Detection." Tony Cole, Chief Technology Officer at Attivo Networks, will discuss the value of modern cyber deception and share ways that retail and hospitality organizations are using virtualized deception fabrics to gain rapid visibility and alert of in-network attackers.
WHO: Tony Cole, Chief Technology Officer, Attivo Networks
WHAT: Deceptively Simple Threat Detection
There are fundamentally two ways to stop an attacker. One is to pursue them and the other is to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be early and accurate in the detection of threats. Globally, retail and hospitality providers are stealthily using virtualized deception fabrics to efficiently plant decoys, bait, lures, and misdirections within their networks to ambush adversaries and trick them into revealing themselves.
More on The Californer
In this session, attendees will learn how deception technology is used to gain rapid visibility and alert of in-network attackers. They will also gain insights into the value organizations are gaining by:
- Reducing dwell time by 90% by detecting and denying lateral movement
- Improving privilege access management by derailing unauthorized active directory (AD) queries
- Detecting and diverting credential theft and reuse
- Pinpointing and validation of insider threat activity (employees, suppliers, third parties)
- Securing Cloud Operations and malicious network activities
- Defending legacy devices and point of sale (POS) terminals from attack
- Detecting and hindering ransomware attacks
- Gathering of forensic evidence and adversary intelligence (IoCs/IoAs/TTPs) reducing triage time by 12X
- Enhancing EDR and SOAR solutions
WHEN: Wednesday, October 7, 2020, 1:00 PM - 1:40 PM EST
WHERE: The three-day 2020 RH-ISAC Cyber Intelligence Summit will be fully virtual.
More on The Californer
To register for the event, visit https://summit.rhisac.org/rsvp/ and reserve your spot.
MEDIA: Tony Cole is available for interviews by request. If you are interested in expert commentary for any upcoming stories, please reach out to Matter Communications at PRAttivo@matternow.com.
WHO: Tony Cole, Chief Technology Officer, Attivo Networks
WHAT: Deceptively Simple Threat Detection
There are fundamentally two ways to stop an attacker. One is to pursue them and the other is to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be early and accurate in the detection of threats. Globally, retail and hospitality providers are stealthily using virtualized deception fabrics to efficiently plant decoys, bait, lures, and misdirections within their networks to ambush adversaries and trick them into revealing themselves.
More on The Californer
- California Lutheran University Receives Over $2.9 Million in Grant Funding
- Nationwide Boiler Supplies In-Stock 200K lb/hr Ultra Low NOx Boiler Package for Recovery Efforts i
- Ventura College Foundation Accepting Scholarship Applications for 2026-27 School Year
- C3.ai, Inc. (AI) Investors Who Lost Money Have Opportunity to Lead Securities Fraud Lawsuit
- California: Governor Newsom proclaims Constitution Day and Citizenship Day
In this session, attendees will learn how deception technology is used to gain rapid visibility and alert of in-network attackers. They will also gain insights into the value organizations are gaining by:
- Reducing dwell time by 90% by detecting and denying lateral movement
- Improving privilege access management by derailing unauthorized active directory (AD) queries
- Detecting and diverting credential theft and reuse
- Pinpointing and validation of insider threat activity (employees, suppliers, third parties)
- Securing Cloud Operations and malicious network activities
- Defending legacy devices and point of sale (POS) terminals from attack
- Detecting and hindering ransomware attacks
- Gathering of forensic evidence and adversary intelligence (IoCs/IoAs/TTPs) reducing triage time by 12X
- Enhancing EDR and SOAR solutions
WHEN: Wednesday, October 7, 2020, 1:00 PM - 1:40 PM EST
WHERE: The three-day 2020 RH-ISAC Cyber Intelligence Summit will be fully virtual.
More on The Californer
- California: Governor Newsom signs legislation 9.17.25
- New Leadership and Renovations Usher in Next Chapter for Sunrise Manor
- Following Trump's politicization of CDC, West Coast states issue unified vaccine recommendations — California breaks from future federal guidance with new law
- Who Will Win the 2025 WNBA Finals? OddsTrader Shares Live Betting Odds and Projections
- Silva Construction Weighs In on the Most Popular Home Design Trends for 2026
To register for the event, visit https://summit.rhisac.org/rsvp/ and reserve your spot.
MEDIA: Tony Cole is available for interviews by request. If you are interested in expert commentary for any upcoming stories, please reach out to Matter Communications at PRAttivo@matternow.com.
Source: Attivo Networks
0 Comments
Latest on The Californer
- IDCXS Addresses Crypto Trading Pain Points with 2 Million TPS Processing and Multi-Layer Security Architecture
- Dr. Richard Austin Heafey, PsyD, of Unfold Psychology and Heafey Practices, Accused of Misconduct
- Bridging Traditional Finance and Web3 Innovation: BLFCW Announces Strategic Vision for Regulated Web3 Economy
- NKSCX Responds to "Coordinated Smear Campaign" as Anonymous Critics Emerge Following Regulatory Milestones
- Broadway Gala Honored Also an Italian
- $ONI Listed on MEXC as ONINO Powers Europe's Tokenization Engine Into Public Platform Launch
- AZETHIO Crypto Exchange Whitepaper Reveals MPC-Secured Infrastructure Processing 1.2 Million Transactions Per Second
- CELOXFI Platform Demonstrates Advanced Security Architecture and Regulatory Framework
- Sharks and Seaside Resilience in Great White Summer on Documentary Showcase
- Finding LVN Jobs in Los Angeles: A Premier Local Agency in LA County Offers Personalized Help
- Work 365 Launches PV 3.0: The Keystone Power App for Microsoft CSPs
- Affinity Nightlife's Post Awards After Party Celebrated with the Industry's Biggest Stars
- Local consultant shows small businesses how to turn red tape into real money
- Stringify AI Launches Complaint Classifier to Automate Enterprise Support Triage
- Hazel-E Hosts Pop-Up Gifting Suite on Melrose
- iPOP Administration & Talent Fund Clean Water Project in Africa, Through the Thirst Project
- California: Governor Newsom announces appointments 9.16.25
- Hollywood Veterans and Rising Stars Join Forces on "HOA" A Vertical Sitcom Designed for Social Media
- LVN Jobs in LA Establishes Local Presence Offers In-Person Staffing Solutions for LA LVN Job Seekers
- Meet a Scientologist Tunes Up with Auto Expert Jimmy Alauria