Written by: Kevin Hiltpold, Federal Sr. Solutions Engineer – At my first job in cybersecurity at one of the biggest Internet providers that ever existed, I asked, “Do we have multiple vendors in our network security stack to provide defense in depth?” The Chief Architect replied, “No, we have multiple vendors to use as leverage when we have a feature request that one of them doesn’t want to fulfill.” With that answer, my philosophy was set. Defense in depth is about being able to detect and stop what the first line of defense lets through, not vendor diversity. It is hard enough finding qualified security professionals who can respond to attacks quickly without forcing them to be fluent with multiple vendors. If you are wondering if several well-meaning security architects and SOC chiefs told me over the years that their environment had defense in depth because their firewall was from one vendor and their IDS from another, sadly, the answer is yes.
defense in depth
Attivo Networks CTO Tony Cole will present a session titled, Deception Technology: Luxury Item or Life Line?, which will overview deception technology and how deploying decoys throughout your environment can strengthen all the levels in a security stack, limitations of Defense in Depth strategies and the economics of defense and how to craft a business case. Additionally, Cole will share why high-fidelity deception decoys are indistinguishable from the real thing, even to advanced attackers.