Finding a budget for CyberSecurity can be hard. Leverage your prior CAPEX expenditures to gather AI training data and uncover your adversary with cheap honeypots.
In this lab we cover some honeypot research conducted at UVU which leveraged old hardware, unused ports, and open source software to create a low-stakes honeypot designed to reveal threat actors. Turn the tables while spending little. Gather AI training data about the latest attempts on your network. In this presentation, I will cover our cybersecurity research deployment in the UVU data center, which can be easily replicated in your environment. We discuss ways to fund such a project for next to nothing. We also talk about the tissue paradigm for this type of project that leverages existing equipment and free software, "If the software breaks or the hardware fails, so what?" I share data on attacks and how that can be converted into valuable intelligence for your production network. I also discuss how you can gather information that is useful to AI. Lastly, we talk about getting your entire site blacklisted by hackers so they don't even bother messing with your network. At the end, we will answer audience questions and explore custom use case scenarios, including scenarios that may benefit you if your firewall is managed by others or if you only have internal resources and need effective trip-wires.