Barbara Hauer of NTT Data and Daniel Buhmann of Fortinet demonstrate why deception technology is a powerful tool for protecting OT infrastructures without requiring AI or machine learning.
Most industrial companies already implemented many security measures in their environment. But how do you know if these measures are sufficient? If an attack will bypass these measures, will you be able to detect and respond in the shortest possible time? Honeypots have been around for a while, but deception technology goes well beyond a high interaction honeypot.
This session will show why deception technology is a powerful tool for protecting OT infrastructures and that deception technology does not require AI or machine learning and can generate threat intelligence for threat analytics and hunting purposes. The panel of experts will demonstrate that deception is a technology that includes benefits like non-intrusiveness, ease of installation, lack of false alarms and cost-effectiveness.
Here is the course outline:
The Art of Deception - How to Use Modern Honeypots to Secure ICS Environments |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |