|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Industry guidelines for cyber-defence require breach defense capabilities. Topics like honeypots, security sensors and continuous monitor come into play. However, what if you could combine all of these techniques? This talk will provide a guideline for developing end-to-end honey networks combining different breach defence techniques. Topics cover open source and enterprise options for any size network