This talk delves into utilizing cloud infrastructure to host canary honeypots that protect your on premise assets. We will talk about the history of honeypots and the pitfalls of poorly configuring them. Then we will highlight the benefits of honeypots for detecting adversaries who have bypassed your perimeter defenses and attempt to put forth the tools to make any deployment successful. The ultimate goal is to equip security teams with tools that provide a large amount to value and do not degrade their security posture.