Session 3.3d: Tutorial - First Steps Deploying Cyber Deception: A Practical Tutorial
Tracks
ㅤ
| Thursday, November 20, 2025 |
| 10:30 AM - 11:30 AM |
| Nicholls Theatre |
Details
Cyber deception is a powerful strategy for detecting and understanding adversary behaviour, but traditional honeypots can be resource-intensive and difficult to deploy at scale. This hands-on tutorial shows how we can use fake credentials, credit cards, and documents as an accessible first step for Defence and government organisations seeking to explore deception-based cyber defence. Participants will learn how to design and deploy HoneyTokens across three practical scenarios: Insider Threat detection, Supply Chain validation, and Data Breach detection. We will look at freely available tools and resources and how to tailor these to your environments and draw on our experience supporting the UK Government trial. A laptop or tablet with a modern web browser and office tools is required for this interactive session. No prior experience with deception technologies or hacking is necessary.
Speaker
Mr Craig Sweetman
Director, Cyber & AI
PentenAmio
ㅤ
Biography
Craig joined PentenAmio after an extensive career developing and managing complex mission systems for Defence, focusing on Intelligence, Electronic Warfare, and Cyber operations; he is focused on advancing technologies that provide an asymmetric advantage. Craig holds Master’s degrees in Science (Information Technology), Cyber Security Operations, Project Management, and Capability Management. He is also a recognized Capability Technology Manager from the Australian Defence Forces’ Capability & Technology Management College.
Mr Dylan Hoffmann
Cyber Architect
PentenAmio
ㅤ
Biography
Dylan Hoffmann has served as a subject matter expert in Cyber Deception and Adversary Engagement for several organizations, where he has spent his time finding the best ways to poke and prod at sophisticated adversaries until they give up their secrets. He was one of the primary authors of the MITRE Engage Framework for Adversary Engagement and previously served as the Policy Lead for the MITRE Engage Framework. He has worked the entire chain of cyber deception operations, from policy and operations planning, to CTI and implementation, to tool building and capability development.
Aside from working in Cyber Deception, he has also advised organizations concerning Russian cyber threat actors, where his expertise lies in assessing and evaluating Russian national security decision-making and strategic doctrine.
He holds a BS in Computer Science with a particular focus on Cyber Security from Tufts University and a MS in Cyber Security and Public Policy from The Fletcher School of Law and Diplomacy.