Loading…
Attending this event?
Back To Schedule
Sunday, June 18 • 10:15am - 11:35am
Detecting intrusions when they happen: Using honey

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

It can take months after a malicious attacker gains access to your system to even know they were there. Next comes months of painful work, analyzing logs, changing credentials, notifying customers, and reviewing code. Honeytokens are a great way to know when an attacker has breached your systems. Honeytokens are credentials that don't actually grant any access but instead trigger alerts that report the intruder's activity.

When attackers gain access to a system, they immediately look for ways to gain more control. One of the easiest ways to expand their presence is to find plaintext credentials lying around in code, config files, or logs, this makes Honey Tokens the perfect trap. In this session, we will walk through exactly how to create real Honey Tokens you can put in your own infrastructure to trip attackers in their stride using open-source tools and your own cloud infrastructure.
If you are working to detect and stop intruders in their tracks, then this session is for you.

Speakers
avatar for Mackenzie Jackson

Mackenzie Jackson

Developer advocate, GitGuardian
Mackenzie is a developer advocate with a passion for DevOps and code security. As the co-founder and former CTO of a health tech startup, he learnt first-hand how critical it is to build secure applications with robust developer operations. Today as a Developer Advocate at GitGuardian... Read More →


Sunday June 18, 2023 10:15am - 11:35am CEST
Workshops | A218
Feedback form isn't open yet.