Designing a High-Credibility Deception Environment

31.03.2026 11:00 - 12:00 (GMT +2)
Register
ABOUT THE EVENT

Customization of Deception Scenarios for Attack Counteraction

Modern cyberattacks often bypass traditional defenses, and prolonged hacker presence in the network creates critical business risks. In this webinar, we will demonstrate how Deception technologies from Labyrinth enable threat detection at the reconnaissance stage, minimize dwell time, and identify complex 0-day attacks without excessive ‘digital noise’.

The meeting program is structured as an intensive practical session, including the following stages:

  • Overview of decoys and their types: analysis of network and file traps to create maximum authenticity.
  • Development of custom solutions: process of creating unique types of decoys, tailored to the specific infrastructure.
  • Technical demonstration: use of Labyrinth Deception Platform customization to build complex scenarios that force attackers to reveal their intentions.

The main goal of the event is to demonstrate the capabilities for deep customization of the platform, allowing adaptation of the ‘labyrinth’ to any complex environment. You will learn how the simulation of vulnerabilities and privileged accounts becomes an effective ‘alarm’ against insiders and BOTNET networks.

Join us to see in practice how to turn the infrastructure into a hostile environment for hackers while maintaining full productivity of real services.

Register
WEBINAR AGENDA

Key topics to be covered during the webinar

Overview of decoys and their types: network/file
Creation of custom types of decoys
Demonstration: using customization to create complex scenarios for an attacker
Q&A Session
SPEAKERS

Expertise at the forefront

Designing a High-Credibility Deception Environment - image 1
Anastasiia Dorosh Cybersecurity Implementation Team Lead, Labyrinth
AUDIENCE

Who is this webinar for?

  • System administrators and cybersecurity engineers;
  • Partners and integrators implementing Labyrinth solutions;
  • Business users looking to enhance the security level of their companies.

See you at the webinar!

Register now!