Discover Security Events in Deception
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Deception technology has matured from a niche defensive tactic into a sophisticated cybersecurity discipline that actively misleads, detects, and analyzes adversaries within network environments. By deploying decoys, honeypots, and fake assets, organizations create traps that reveal attacker presence and tactics while protecting genuine systems.
Modern deception platforms have evolved significantly beyond simple honeypots. Contemporary solutions deploy sophisticated deception layers including fake credentials, breadcrumbs, decoy documents, emulated services, and entire fabricated network segments that appear legitimate to attackers. These systems integrate with existing security infrastructure, providing high-fidelity alerts with minimal false positives since any interaction with deception assets indicates malicious activity or misconfiguration.
Deception technology enables proactive defense by forcing attackers to expend resources distinguishing real assets from decoys, increasing their operational costs and time-to-compromise. Organizations gain valuable threat intelligence by observing attacker techniques, tools, and procedures (TTPs) in controlled environments without risking production systems. This intelligence informs security improvements, incident response procedures, and threat hunting activities.
Enterprise adoption of deception technology has accelerated as solutions become more automated, scalable, and integrated with Security Information and Event Management (SIEM) systems and Security Orchestration, Automation and Response (SOAR) platforms. Organizations deploy deception across cloud environments, IoT networks, and operational technology systems. Challenges remain in resource requirements, complexity of deployment, and ensuring deception assets remain convincing as adversaries develop detection techniques.
All security events are automatically streamed into this table on a daily basis.
12th November 2025 | Tis the Season to Outsmart Attackers: What Kevin McCallister Can Teach Us About Cyber Deception
This holiday season, take a cue from one of the most inventive defenders ever—Kevin McCallister. Like Kevin, modern defenders succeed by knowing what matters most, anticipating attacker moves, and using every tool strategically.
Join the MITRE Engage Lead to explore how crown jewel analysis, network profiling, and strategic placement can transform your deception program from tactical to transformational. You’ll also discover Living Off the Land Engagement (LOTLE) techniques-using existing IT assets to build authentic, low-friction deception layers that outsmart adversaries.
End the year with a session that blends holiday nostalgia and practical insight—showing how smart strategy and creative thinking can make your network every bit as unwelcoming to attackers as Kevin’s house was to the Wet Bandits.
Online • Part of Acalvio
29th October 2025 | Leveraging your home field advantage to stop ransomware
Ransomware shows no signs of slowing down and continues to be a significant threat in Healthcare. The threat actors continue to evolve and improve their sophistication. Scattered Spider has gone from targeting telcos to being one of the top Ransomware affiliates in the world through social engineering.
But all is not hopeless. As Defenders, we have many advantages that often go unused. We have a home field advantage in that they don’t know our environment. They also have needs like privileged access that we can turn against them.
In this webinar, Tim Crothers, former UnitedHealth Group SVP of Global Cyber Defense and former Mandiant CISO, will explore how attackers succeed—and how defenders can flip the script by exploiting attackers’ own needs.
Online • Part of Acalvio
26th March 2025 | Scaling Against the Machines CounterCraft v4 Transforms Deception for the AI-Enabled Threat Era
The event "Scaling Against the Machines: CounterCraft v4 Transforms Deception for the AI-Enabled Threat Era" was insightful, focusing on advanced deception techniques in cybersecurity. Attendees appreciated the in-depth analysis of AI-driven threats and the innovative strategies presented by CounterCraft v4. The speakers effectively highlighted the importance of adaptive security measures. Participants left with a better understanding of how to implement deception technologies to counteract evolving cyber threats in an AI-dominated landscape.
EMEA • Part of CounterCraft