Educause Security Discussion mailing list archives
Re: [REMINDER] TechBurst - June 28th, 2018 - Sweetening Your Threat Intelligence with Automated Honeypots
From: Sarah Bigham <sarah () REN-ISAC NET>
Date: Tue, 3 Jul 2018 09:28:42 -0400
The recording and slides from this TechBurst are now available at: https://www.ren-isac.net/calendar/june/tb062818.html On 6/28/2018 9:08 AM, Sarah Bigham wrote:
Date: Thursday, June 28th, 2018 Time: Noon (12:00) ET Link: https://zoom.us/j/230380413 Audience [1]: [Pb] **Public** Speakers: ========= Alex Merck, Security Engineer, Duke University Chris Collins, Senior Automation Engineer and the Web Architecture Lead, Duke University DESCRIPTION =================== Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence. SPEAKER BIO(S): ============ Alexander Merck is a security engineer at Duke University, with emphasis in security automation, network security, and reverse engineering. When not actively attacking or defending networks, Alex can be found spreading honeypots across the world. Chris Collins is a senior automation engineer and the web architecture lead at Duke University’s Office of Information Technology. He’s a container and automation evangelist, helps leads adoption of containers within the university, and loves to talk about them with anyone who will listen, much to the annoyance of the co-workers who sit closest to him. ------------------------------- [1] INFORMATION SHARING GUIDANCE: This TechBurst is Public. TechBursts are limited to REN-ISAC members unless marked with one of the following exception tags: - "MG" (Members and Guests) sessions are open to members and hosted, trusted guests of members. Access to MG TechBursts require authentication with a REN-ISAC userid and password. So, guests must view the webcast with the member present. - "Pb" (Public) indicates a session is open to the public. **This TechBurst will be archived.** For those without IRC access, you may send questions to techburst () ren-isac net or use the Q&A screen within Zoom. Please note that only you and the Presenter will see your question.
-- V/R, Sarah Bigham Lead Security Analyst REN-ISAC
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- Re: [REMINDER] TechBurst - June 28th, 2018 - Sweetening Your Threat Intelligence with Automated Honeypots Sarah Bigham (Jul 03)