Description: Threat Intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (iff properly deployed) this data can be used to respond to incoming threats as they arise. This talk will discuss the do?s and don?ts of integrating honeypots into your environment and how to obtain critical (actionable) insight from honeypot activity using open source tools.
Bio: James Taliento is a Security Researcher primarily focused on security efficacy (a fancy word for offensive security research). As the founder of and Chief Research Officer at Cynical Security he spends most of his time overtaking networks and analyzing attack data. He?s consulted with Fortune 100?s in a variety of industries, and thoroughly enjoys designing creative ways to use honeypots. When James isn?t damaging his eyesight by staring at his laptop for hours on end, he could be found enjoying a good beer, engaging in some nonsensical DIY project, or laughing at inappropriate things on the internet.
For More Information Please Visit: - http://circlecitycon.com/
http://www.irongeek.com/i.php?page=videos/circlecitycon2015/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.