Abstract
This talk will analyse the cyber kill-chain, explaining how deception can be used at each layer of the chain. The speakers will highlight the benefits of how deception technology gives organizations a way to reliably detect targeted attacks in real-time, without false positives, and with far less resources than typical defences employed today. In the presentation they will deconstruct attacks of the last few years to develop a model of ‘full stack deception’ that can lure even the most skilled attackers away from critical assets into a virtual world, where their motives are revealed.