43 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 How Anthropologie gets omnichannel right (and what to learn) 27:29
#214 - Deceive to Detect (with Yuriy Gatupov)
Manage episode 459609769 series 2849492
🔥 Hackers Beware! Cyber Deception is Changing the Game 🔥
In this must-hear episode of CISO Tradecraft, we expose a mind-blowing cybersecurity strategy that flips the script on attackers. Instead of waiting to be breached, cyber deception technology tricks hackers into revealing themselves—before they can do real damage. 🚨🎭
Imagine laying digital traps—fake credentials, bogus systems, and irresistible bait—that lead cybercriminals straight into a controlled maze where every move they make is tracked.
Early threat detection? ✅
Real-time attacker intel? ✅
Fewer false positives? ✅
🎙️ Featuring deception tech guru Yuriy Gatupov, we break down:
✅ How deception tech works & why it’s a game-changer
✅ How to expose and track hackers in real time
✅ How to prove ROI and make the case for your org Cyber deception isn’t just defense—it’s offense against cyber threats. Are you ready to fight back? Listen now!
Big thanks to our Sponsors
ThreatLocker - https://hubs.ly/Q02_HRGK0
CruiseCon - https://cruisecon.com/
Contact Yuriy Gatupov - info@labyrinth.tech
Yuri's LinkedIn - https://www.linkedin.com/in/yuriy-gatupov-373155281/
Transcripts: https://docs.google.com/document/d/1oyQzCBRoPLbDOCOCypJMGGXxcPI5w75o
Chapters
- 02:05 History of Cyber Deception
- 04:57 Advantages of Deception Technology
- 06:57 Engagement and Detection Strategies
- 10:18 How Deception Technology Works
- 16:13 Attack Scenarios and Detection
- 24:09 Decoys and Deception: A New Paradigm
- 24:56 Real-World Success Stories
- 33:30 Deception in OT and SCADA Systems
- 37:38 Calculating ROI for Deception Technologies
226 episodes
Manage episode 459609769 series 2849492
🔥 Hackers Beware! Cyber Deception is Changing the Game 🔥
In this must-hear episode of CISO Tradecraft, we expose a mind-blowing cybersecurity strategy that flips the script on attackers. Instead of waiting to be breached, cyber deception technology tricks hackers into revealing themselves—before they can do real damage. 🚨🎭
Imagine laying digital traps—fake credentials, bogus systems, and irresistible bait—that lead cybercriminals straight into a controlled maze where every move they make is tracked.
Early threat detection? ✅
Real-time attacker intel? ✅
Fewer false positives? ✅
🎙️ Featuring deception tech guru Yuriy Gatupov, we break down:
✅ How deception tech works & why it’s a game-changer
✅ How to expose and track hackers in real time
✅ How to prove ROI and make the case for your org Cyber deception isn’t just defense—it’s offense against cyber threats. Are you ready to fight back? Listen now!
Big thanks to our Sponsors
ThreatLocker - https://hubs.ly/Q02_HRGK0
CruiseCon - https://cruisecon.com/
Contact Yuriy Gatupov - info@labyrinth.tech
Yuri's LinkedIn - https://www.linkedin.com/in/yuriy-gatupov-373155281/
Transcripts: https://docs.google.com/document/d/1oyQzCBRoPLbDOCOCypJMGGXxcPI5w75o
Chapters
- 02:05 History of Cyber Deception
- 04:57 Advantages of Deception Technology
- 06:57 Engagement and Detection Strategies
- 10:18 How Deception Technology Works
- 16:13 Attack Scenarios and Detection
- 24:09 Decoys and Deception: A New Paradigm
- 24:56 Real-World Success Stories
- 33:30 Deception in OT and SCADA Systems
- 37:38 Calculating ROI for Deception Technologies
226 episodes
All episodes
×
1 #226 - Vulnerability Management (with Chris Hughes) 45:53

1 #224 - The Evolution of Data Loss Prevention (DLP) 30:34


1 #222 - 40 Years of Career Advice in 40 Minutes 40:11

1 #221 - Microsoft Majorana is Taking the Quantum Leap 27:47


1 #219 - The Professionalization of CISOs (with Steve Zalewski & Tyson Kopczynski) 41:15

1 #218 - How AI Changes Talent Management (with Colleen Lennox) 23:49

1 #217 - Includes No Dirt (with Bill Dougherty) 44:59

1 #216 - The TTPs of a Security Champions Program (with Dustin Lehr) 45:32


1 #214 - Deceive to Detect (with Yuriy Gatupov) 45:47

1 #213 - How to Build a Successful Cybersecurity Startup (with Ross Haleliuk) 45:45

1 #212 - Repeatable, Attestable, and Defensible AI (with AWS's Former Deputy CISO Merritt Baer) 45:35

1 #211 - Allowlisting and Ringfencing (with Kieran Human) 27:43

1 #210 - Salt Typhoon and Vulnerable Telecoms 45:39

1 #209 - AI Singularity (with Richard Thieme) 48:32

1 #208 - Insider Threat (with Shawnee Delaney) 45:25



1 #205 - Wisdom from the 1st Cyber Colonel (JC Vega) 46:28

1 #204 - Shadows and Zombies in the Data Center 23:53


1 #202 - Cybersecurity Crisis: Are We Failing the Next Generation? 45:09





1 #197 - Fedshark's Blueprint for Cost Effective Risk Reduction 46:27
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.