In this talk, John will cover some of the more entertaining and enlightening examples of a year of running cyber attribution and deception campaigns.The goal of this presentation is to equip the attendees with real-life examples of how these technologies work and how they can provide immediate value to an organization.He will also provide free tools and techniques that can be implemented immediately upon returning to work.
John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.