Educause Security Discussion mailing list archives

[REMINDER] TechBurst - June 28th, 2018 - Sweetening Your Threat Intelligence with Automated Honeypots


From: Sarah Bigham <sarah () REN-ISAC NET>
Date: Thu, 28 Jun 2018 09:08:48 -0400

Date: Thursday, June 28th, 2018
Time: Noon (12:00) ET
Link:  https://zoom.us/j/230380413

Audience [1]: [Pb] **Public**

Speakers:
=========
Alex Merck, Security Engineer, Duke University
Chris Collins, Senior Automation Engineer and the Web Architecture Lead,
Duke University

DESCRIPTION
===================

Many organizations currently deploy honeypots within their networks to
generate actionable threat intelligence. However, the process of
deploying numerous honeypots across a network can require a significant
amount of setup and configuration. We will present a method for
dynamically and automatically deploying honeypots using Docker and
Ansible, as well as deployment techniques for several popular cloud
providers. By using these techniques to deploy honeypots, organizations
can rapidly and easily enhance their current threat intelligence.


SPEAKER BIO(S):
============

Alexander Merck is a security engineer at Duke University, with emphasis
in security automation, network security, and reverse engineering. When
not actively attacking or defending networks, Alex can be found
spreading honeypots across the world.

Chris Collins is a senior automation engineer and the web architecture
lead at Duke University’s Office of Information Technology. He’s a
container and automation evangelist, helps leads adoption of containers
within the university, and loves to talk about them with anyone who will
listen, much to the annoyance of the co-workers who sit closest to him.

-------------------------------

[1] INFORMATION SHARING GUIDANCE: This TechBurst is Public.

TechBursts are limited to REN-ISAC members unless marked with one of the
following exception tags:

- "MG" (Members and Guests)  sessions are open to members and hosted,
trusted guests of members. Access to MG TechBursts require
authentication with a REN-ISAC userid and password. So, guests must view
the webcast with the member present.

- "Pb" (Public) indicates a session is open to the public.

**This TechBurst will be archived.**

For those without IRC access, you may send questions to
techburst () ren-isac net or use the Q&A screen within Zoom. Please note
that only you and the Presenter will see your question.

-- 

Sarah Bigham
Lead Security Analyst     REN-ISAC
2719 E. 10th Street, Suite 201 /   Bloomington, IN 47408
office: +1(812) 855-2267 sarah () ren-isac net
https://www.linkedin.com/company/ren-isac  Research and Education
Networking – Information Sharing and Analysis Center / www.ren-isac.net
 24x7 Watch Desk:  +1(317) 278-6630, soc () ren-isac net


"Distrust and caution are the parents of security" - Benjamin Franklin








Attachment: signature.asc
Description: OpenPGP digital signature


Current thread: