It's easy to get sucked into the world of technology, forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.
It's easy to get sucked into the world of technology, often forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.
When I saw this post (https://twitter.com/Dr_Cybercrime/status/1462506991012786190/), I knew immediately I wanted to learn more about how a practitioner's book could be used to change how we teach the next generation of cybersecurity practitioners - blue teams, red teams, and purple teams alike.
During this conversation we get to hear from a practitioner/author, a professor, and a student. We look back to ancient Egyptian tomb-protection practices and work our way to a future where we keep a close eye on the humans with technology. Yes, even though we continue to throw all sorts of technology at the problems we face (yep, the same ones we humans have created), the human is still at the center of these scenarios.
As with most things, there's no single easy answer to a problem. This remains true here in this conversation as we ended up talking about the ethical lines drawn around how and where we can study the how/when/why people (bad actors) act when presented with a a variety of opportunities to take advantage of a situation. Is it OK to track bad actors and their behavior? How far can that be taken? Can we do like the ancient Egyptians and lock someone in our cyber tomb if we catch them in a place they shouldn't be?
Regardless of your position on this matter, we bring this episode to you "em hotep."
____________________________
Guests
C. Jordan Howell
On LinkedIn | https://www.linkedin.com/in/c-jordan-howell-39ba4718b/
On Twitter | https://twitter.com/Dr_Cybercrime
Chris Sanders
On LinkedIn | https://www.linkedin.com/in/chrissanders88/
On Twitter | https://twitter.com/chrissanders88
William Palafox
On LinkedIn | https://www.linkedin.com/in/williamjpalafox/
On Twitter | https://twitter.com/wpalafox91
____________________________
This Episode’s Sponsors
HITRUST: https://itspm.ag/itsphitweb
Imperva: https://itspm.ag/rsaarchweb
____________________________
Resources
Book | Intrusion Detection Honeypots: Detection through Deception: https://www.amazon.com/dp/1735188301/
____________________________
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-security
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships