Learn Backend Development Part-Time, Online
Start speaking a new language. It’s just 3 weeks away.
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover a deception detection approach for cloud security in this 56-minute BSidesCharm conference talk. Learn how to implement stealthy tripwires using canaries with honey and razors to detect post-breach lateral movement and privilege escalation with low false positives. Explore defensive techniques that borrow from red team stealth approaches, including restricted admin roles, honey resources (buckets and files) with access detection flags, cached honey credentials, and detection of IAM permission enumeration. Speaker Jenko Hwong, who heads threat research at WideField Security with a focus on identity-based attacks and abuse, shares insights from his extensive background in security startups spanning vulnerability scanning, AV/AS, pen-testing, threat intelligence, and Windows security.
Syllabus
BSidesCharm 2025 - Fight Stealth with Stealth: Detecting post-breach activity in the Cloud - Jenko H
Taught by
BSidesCharm