2026-05-08 –, Main Stage
Embark on a whirlwind tour of global cyber deception with a seasoned(?) security engineer who's been running honeypots in some of the world's most intriguing locales, including the bustling digital battleground of Ukraine. This talk will blend humor and hard-won wisdom to reveal the lessons learned from deploying, customizing, and maintaining honeypots across diverse environments. Participants will enjoy a lively narrative filled with tales of cyber trickery, cultural quirks, and the occasional mishap, all while gaining actionable insights into enhancing their own security strategies.
Imagine being a digital beekeeper, setting up traps for cyber threats in some of the most unexpected places around the globe, from the frosty landscapes of Ukraine to the bustling tech hubs of Tokyo. Over the years, I’ve had the peculiar pleasure of watching bad actors stumble into these traps, often with the same grace as a bull in a china shop. This talk is less about the “how” and more about the “what-the-heck-just-happened” moments that have made this journey unforgettable. Buckle up for a rollercoaster ride through the wild world of global honeypots, where every server tells a story, and sometimes, that story is downright hilarious.
Introduction: Setting the Scene
- Brief overview of honeypots and their purpose in cybersecurity.
- Introduction to me: a globe-trotting security engineer with a knack for storytelling and a passion for cyber deception.
- A quick teaser of the countries covered.
The Global Honeypot Experience
- A World Tour of Cyber Threats:
- Overview of the countries where honeypots were deployed.
- Brief anecdotes about the unique cyber threats and attack patterns observed in each location.
- Cultural and Environmental Considerations:
- How local culture and internet infrastructure impact honeypot deployment.
- Humorous tales of language barriers, time zone mix-ups, and unexpected technical challenges.
Customizing Honeypots for Different Environments
- One Size Does Not Fit All:
- Detailed examples of how honeypots were tailored to mimic local systems and applications.
- Creative tweaks and customizations that improved effectiveness.
- Lessons from the Field:
- Success stories and failures that provided valuable insights.
- Practical tips for customizing honeypots in various environments.
Operational Challenges and Triumphs
- Keeping the Honeypots Buzzing:
- Maintenance and monitoring strategies that worked (and those that didn’t).
- Tools and technologies that proved invaluable.
- Handling the Unexpected:
- Funny and frustrating incidents, from unexpected downtime to bizarre attack vectors.
- Lessons on resilience and adaptability.
Analyzing and Responding to Attacks
- From Data to Defense:
- How the data collected from honeypots informed broader security strategies.
- Real-life examples of attacks thwarted thanks to honeypot intelligence.
- The Human Element:
- Stories of interacting with curious researchers, bemused sysadmins, and relentless attackers.
- The importance of community and collaboration in the cybersecurity landscape.
Key Takeaways and Future Directions
- Summing Up:
- Recap of the most important lessons learned from the global honeypot project.
- Actionable advice for those looking to implement or enhance their own honeypot strategies.
- Looking Ahead:
- Emerging trends in cyber deception and honeypot technology.
- Exciting new challenges and opportunities on the horizon.
Chicago-based (But soon Porto!) and proudly a natural creature of winter, I thrive on snow, OSS, and just the right amount of chaos. Whether sipping Grand Mayan Extra Añejo or warding off cyber threats with a mix of honeypots, magic spells, and a very opinionated flamingo named Sasha (the BSidesChicago.org mascot), I keep things interesting. Honeypots and refrigerators rank among my favorite things—though my neighbors would likely disagree.