Deploying Honeypots to Gather Actionable Threat Intelligence
via YouTube
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Learn Backend Development Part-Time, Online
Overview
Syllabus
Intro
Backstory
What this talk is about
DISCLAIMER
Outline
What is threat intelligence?
TI Phases
Collection
Data / Event Correlation
SIEM
How do we increase accuracy?
What's a honeypot?
Common Problems
Low Interaction Honeypots
Medium Interaction Honeypots
High Interaction Honeypots
Why High Interaction for TI?
Making It Count
They MUST look legit
Adding Production Value
HI Honeypot Considerations
Considerations With Virtualization
Cloud Considerations
Examples of Canaries
Market Watch
Recap
Conclusion
Next Development
References
People to Follow