• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • About Us
    • Governance
      • Steering Committee
      • Membership Committee
      • Technical Advisory Group
      • Microsoft Analysis Team
    • Sponsors & Partners
    • Report a Vulnerability
    • History
    • Diversity
    • Accessibility
    • Staff
  • Membership
    • New Members: Start Here
      • Nomination Process
      • SSO
      • Slack
    • Get Involved!
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Services
  • Assessments
    • Comprehensive General Assessments
    • Policy, Process, and Compliance Reviews
    • Penetration Testing
    • Kickstart Engagements
    • Tabletop Exercises
  • News
    • Resources for News Media
  • Events
    • Event Archive
  • Login
  • Report a Vulnerability
  • Contact Us

REN-ISAC

  • Home
  • About Us
  • Membership
  • Services
  • Assessments
  • News
  • Events
  • Search
  • Login
  • Report a Vulnerability
  • Contact Us
  • Home
  • Events
  • webinars
  • 2018
  • TechBurst: June 28, 2018

Sweetening Your Threat Intelligence with Automated Honeypots

Thursday, June 28, 2018

12:00 PM – 1:00 PM

-

Audience [1]: [Pb] **Public**
Slides:  Linked here

Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence.

Speakers:

Alexander Merck is a security engineer at Duke University, with emphasis in security automation, network security, and reverse engineering. When not actively attacking or defending networks, Alex can be found spreading honeypots across the world.

Chris Collins is a senior automation engineer and the web architecture lead at Duke University’s Office of Information Technology. He’s a container and automation evangelist, helps leads adoption of containers within the university, and loves to talk about them with anyone who will listen, much to the annoyance of the co-workers who sit closest to him.

-------------------------------

[1] INFORMATION SHARING GUIDANCE: This TechBurst is Public.

TechBursts are limited to REN-ISAC members unless marked with one of the following exception tags:

- "MG" (Members and Guests)  sessions are open to members and hosted, trusted guests of members. Access to MG TechBursts require authentication with a REN-ISAC userid and password. So, guests must view the webcast with the member present.

- "Pb" (Public) indicates a session is open to the public.

**This TechBurst will be archived.**

 

  • Event Archive

REN-ISAC social media channels

  • Twitter
  • LinkedIn

Research & Education Networks Information Sharing & Analysis Center

Contact Us
2715 E. Tenth Street
Bloomington, IN 47408
812-856-0717
info@ren-isac.net

Member of the Indiana University Cybersecurity Community

24-Hour CSIRT Watch Desk
+1 317-274-7228
soc@ren-isac.net

Report a Vulnerability

Indiana University

Accessibility | College Scorecard | Privacy Notice | Copyright © 2025 The Trustees of Indiana University