Lisa van Staden
A software engineer who has spent the last two and a half years dabbling in deception technologies at Thinkst.
Session
12-06
16:10
45min
Fool me once? Good. Cloud deception done right.
Jay Bissict, Lisa van Staden
Deception allows defenders to easily impose cost on an attacker in your environment. With cloud usage being commonplace in modern organisations, we will talk about deploying deception in your cloud environment - making it a hostile place for any unwanted visitors. From deploying fake credentials, to fake IdPs and entire fake infrastructures, we have you covered! Join us to learn more about equipping your cloud environment with breach detection that works.
Track 3
