• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • Our Trust Community
    • Overview
    • Mission
  • Membership
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Public Resources
    • Alerts and Advisories
    • CSIRT
    • HECVAT/CBI
    • Peer Assessment Service
    • SANS
    • Workshops
    • Helpful Resources
  • Member Resources
    • Looking for More Info?
    • Enterprise Participation and Reg v2
    • Get Involved!
    • Daily Watch Report
    • Passive DNS
    • Security Event System
  • Events
    • Event Archive
  • About Us
    • Governance
      • Steering Committee
      • Membership Committee
      • Technical Advisory Group
      • Microsoft Analysis Team
    • Sponsors
    • Partners
    • Contributors
    • Member List
    • History
    • Accessibility
    • Staff
  • Login
  • Contact Us

REN-ISAC

  • Home
  • Our Trust Community
    • Overview
    • Mission
  • Membership
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Public Resources
    • Alerts and Advisories
    • CSIRT
    • HECVAT/CBI
    • Peer Assessment Service
    • SANS
    • Workshops
    • Helpful Resources
  • Member Resources
    • Looking for More Info?
    • Enterprise Participation and Reg v2
    • Get Involved!
    • Daily Watch Report
    • Passive DNS
    • Security Event System
  • Events
    • Event Archive
  • About Us
    • Governance
    • Sponsors
    • Partners
    • Contributors
    • Member List
    • History
    • Accessibility
    • Staff
  • Search
  • Login
  • Contact Us
  • Home
  • Events
  • June
  • TechBurst: June 28, 2018

Sweetening Your Threat Intelligence with Automated Honeypots

Thursday, June 28, 2018

12:00 PM – 1:00 PM

-

Audience [1]: [Pb] **Public**
Slides:  Linked here

Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence.

Speakers:

Alexander Merck is a security engineer at Duke University, with emphasis in security automation, network security, and reverse engineering. When not actively attacking or defending networks, Alex can be found spreading honeypots across the world.

Chris Collins is a senior automation engineer and the web architecture lead at Duke University’s Office of Information Technology. He’s a container and automation evangelist, helps leads adoption of containers within the university, and loves to talk about them with anyone who will listen, much to the annoyance of the co-workers who sit closest to him.

-------------------------------

[1] INFORMATION SHARING GUIDANCE: This TechBurst is Public.

TechBursts are limited to REN-ISAC members unless marked with one of the following exception tags:

- "MG" (Members and Guests)  sessions are open to members and hosted, trusted guests of members. Access to MG TechBursts require authentication with a REN-ISAC userid and password. So, guests must view the webcast with the member present.

- "Pb" (Public) indicates a session is open to the public.

**This TechBurst will be archived.**

 

  • Event Archive

REN-ISAC social media channels

  • Twitter
  • LinkedIn

Research & Education Networks Information Sharing & Analysis Center

Contact Us
2715 E. Tenth Street
Bloomington, IN 47408
812-856-0717
info@ren-isac.net

Member of the Indiana University Cybersecurity Community

24-Hour CSIRT Watch Desk
+1 317-274-7228
soc@ren-isac.net

Indiana University

Accessibility | Privacy Notice | Copyright © 2021 The Trustees of Indiana University