Header image

Session 3.3d: Tutorial - First Steps Deploying Cyber Deception: A Practical Tutorial

Tracks
Thursday, November 20, 2025
10:30 AM - 11:30 AM
Nicholls Theatre

Details

Cyber deception is a powerful strategy for detecting and understanding adversary behaviour, but traditional honeypots can be resource-intensive and difficult to deploy at scale. This hands-on tutorial shows how we can use fake credentials, credit cards, and documents as an accessible first step for Defence and government organisations seeking to explore deception-based cyber defence. Participants will learn how to design and deploy HoneyTokens across three practical scenarios: Insider Threat detection, Supply Chain validation, and Data Breach detection. We will look at freely available tools and resources and how to tailor these to your environments and draw on our experience supporting the UK Government trial. A laptop or tablet with a modern web browser and office tools is required for this interactive session. No prior experience with deception technologies or hacking is necessary.


Speaker

Agenda Item Image
Mr Ben Whitham
Group Cto
Pentenamio

Biography

After leaving the military, Ben worked as a engineer building cyber incident response capability. Over the last 15 years he has co-founded several companies, including M5 Network Security and Penten. He now works in the UK on building a series of products related to generating fake things using machine learning for cyber deception and active cyber defence.
loading