ITSPmagazine Podcast Network

From Ancient Tomb Traps To Modern-Day Honeypots | Intrusion Detection And Deception: The Role Of Honey Pots And Human Nature In Cybersecurity Education | Redefining Security With Assistant Professor C. Jordan Howell, Author Chris Sanders, And Student William Palafox

Episode Summary

It's easy to get sucked into the world of technology, forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.

Episode Notes

It's easy to get sucked into the world of technology, often forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.

When I saw this post (https://twitter.com/Dr_Cybercrime/status/1462506991012786190/), I knew immediately I wanted to learn more about how a practitioner's book could be used  to change how we teach the next generation of cybersecurity practitioners - blue teams, red teams, and purple teams alike.

During this conversation we get to hear from a practitioner/author, a professor, and a student. We look back to ancient Egyptian tomb-protection practices and work our way to a future where we keep a close eye on the humans with technology. Yes, even though we continue to throw all sorts of technology at the problems we face (yep, the same ones we humans have created), the human is still at the center of these scenarios.

As with most things, there's no single easy answer to a problem. This remains true here in this conversation as we ended up talking about the ethical lines drawn around how and where we can study the how/when/why people (bad actors) act when presented with a a variety of opportunities to take advantage of a situation. Is it OK to track bad actors and their behavior? How far can that be taken? Can we do like the ancient Egyptians and lock someone in our cyber tomb if we catch them in a place they shouldn't be?

Regardless of your position on this matter, we bring this episode to you "em hotep."

____________________________

Guests

C. Jordan Howell
On LinkedIn | https://www.linkedin.com/in/c-jordan-howell-39ba4718b/
On Twitter | https://twitter.com/Dr_Cybercrime

Chris Sanders
On LinkedIn | https://www.linkedin.com/in/chrissanders88/
On Twitter | https://twitter.com/chrissanders88

William Palafox
On LinkedIn | https://www.linkedin.com/in/williamjpalafox/
On Twitter | https://twitter.com/wpalafox91

____________________________

This Episode’s Sponsors

HITRUST: https://itspm.ag/itsphitweb

Imperva: https://itspm.ag/rsaarchweb

____________________________

Resources

Book | Intrusion Detection Honeypots: Detection through Deception: https://www.amazon.com/dp/1735188301/

____________________________

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-security

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships