Per discussion with security engineers from other parts of the public sector, I would like to invite them to a guild meeting to discuss past efforts outside of GSA in successfully establishing honeypots and honeynets.
For a honeypot or honeypot network (honeynet). we would establish applications that appear legitimate, but are in fact designed to entice adversaries into practicing their tactics, techniques, and protocols on systems we configure with aggressive logging. They would thereby compromise those very tactics and depreciate their effectiveness in the future as we disseminate them. For maximum effect, it would be nice if the guild could pilot these across several partner agencies, and build a low friction system to correlate and share common behaviors for agency security engineers to establish patterns of behavior and follow actionable anomalies.
Per discussion with security engineers from other parts of the public sector, I would like to invite them to a guild meeting to discuss past efforts outside of GSA in successfully establishing honeypots and honeynets.
For a honeypot or honeypot network (honeynet). we would establish applications that appear legitimate, but are in fact designed to entice adversaries into practicing their tactics, techniques, and protocols on systems we configure with aggressive logging. They would thereby compromise those very tactics and depreciate their effectiveness in the future as we disseminate them. For maximum effect, it would be nice if the guild could pilot these across several partner agencies, and build a low friction system to correlate and share common behaviors for agency security engineers to establish patterns of behavior and follow actionable anomalies.