home.aspx

 
.

WHY YOU SHOULD BE USING DECEPTION: DECOYS, HONEYPOTS, AND RED HERRINGS

Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys and honeypots can be high-value, low-noise, and identify threats previously thought to be undetectable. Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years’ experience, for this webinar where he will explore computer security deception.  Roger is one of the world’s most prolific deployers of enterprise honeypots and author of the popular book, Honeypots for Windows (Apress).