Kevin Fiscus (@kevinbfiscus) 's Twitter Profile
Kevin Fiscus

@kevinbfiscus

Infosec guy, SANS Instructor, SANS course author, cyber deception expert, father, and a guy with a welder in my garage.

ID: 18077802

linkhttp://www.cdasecurity.com calendar_today12-12-2008 15:17:30

7,7K Tweet

1,1K Followers

1,1K Following

Kevin Fiscus (@kevinbfiscus) 's Twitter Profile Photo

Reduce dwell time by 91%! Learn #cyberdeception from #SANS in person or live online starting July 25th. sans.org/cyber-securityโ€ฆ

SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

๐ŸšจNEW COURSE ๐Ÿšจ Turn the tables on attackers so that they need to be perfect to avoid detection, while you only need to be right once to catch them. #SEC550 View the syllabus & register here: sans.org/u/1hdC

๐ŸšจNEW COURSE ๐Ÿšจ

Turn the tables on attackers so that they need to be perfect to avoid detection, while you only need to be right once to catch them. #SEC550

View the syllabus & register here: sans.org/u/1hdC
SANS APAC (@sansapac) 's Twitter Profile Photo

๐ŸŽฅ SANS FREE Webcast ๐Ÿ’ป Introduction to Cyber Deception: Taking back the advantage from the attackers ๐Ÿ—“๏ธ Thursday, 16 Jun 2022 10:30AM SST (16 Jun 2022 02:30 UTC) ๐Ÿ‘ค Speaker: Kevin Fiscus More info and register ๐Ÿ‘‰ sans.org/u/1lJx ๐Ÿ‘ˆ

๐ŸŽฅ SANS FREE Webcast ๐Ÿ’ป
Introduction to Cyber Deception: Taking back the advantage from the attackers

๐Ÿ—“๏ธ Thursday, 16 Jun 2022 10:30AM SST (16 Jun 2022 02:30 UTC) 
๐Ÿ‘ค Speaker: <a href="/kevinbfiscus/">Kevin Fiscus</a> 

More info and register ๐Ÿ‘‰ sans.org/u/1lJx ๐Ÿ‘ˆ
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Go beyond the honeypot. Kevin Fiscus will show you the way. He'll speak about how #CyberDeception enhances traditional security controls & works with #ZTA, #CTI, & #AdversaryEmulation. Don't miss this critical webcast! Register now sans.org/u/1lTR #SEC550 #ActiveDefense

Go beyond the honeypot. <a href="/kevinbfiscus/">Kevin Fiscus</a> will show you the way. He'll speak about how #CyberDeception enhances traditional security controls &amp; works with #ZTA, #CTI, &amp; #AdversaryEmulation. Don't miss this critical webcast!

Register now sans.org/u/1lTR #SEC550 #ActiveDefense
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Go beyond the honeypot. Kevin Fiscus will show you the way. He'll speak about how #CyberDeception enhances traditional security controls & works with #ZTA, #CTI, & #AdversaryEmulation. Don't miss this critical webcast! Register now sans.org/u/1lTR #SEC550 #ActiveDefense

Go beyond the honeypot. <a href="/kevinbfiscus/">Kevin Fiscus</a> will show you the way. He'll speak about how #CyberDeception enhances traditional security controls &amp; works with #ZTA, #CTI, &amp; #AdversaryEmulation. Don't miss this critical webcast!

Register now sans.org/u/1lTR #SEC550 #ActiveDefense
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Go beyond the honeypot. Kevin Fiscus will show you the way. He'll speak about how #CyberDeception enhances traditional security controls & works with #ZTA, #CTI, & #AdversaryEmulation. Don't miss this critical webcast! Register now sans.org/u/1lTR #SEC550 #ActiveDefense

Go beyond the honeypot. <a href="/kevinbfiscus/">Kevin Fiscus</a> will show you the way. He'll speak about how #CyberDeception enhances traditional security controls &amp; works with #ZTA, #CTI, &amp; #AdversaryEmulation. Don't miss this critical webcast!

Register now sans.org/u/1lTR #SEC550 #ActiveDefense
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

๐Ÿฏ HAPPENING TOMORROW ๐Ÿฏ Kevin Fiscus will be speaking about how #CyberDeception enhances traditional security controls & works with #ZTA, #CTI, & #AdversaryEmulation. Don't miss this critical webcast! Register now: sans.org/u/1lTR #SEC550 #ActiveDefense

๐Ÿฏ HAPPENING TOMORROW ๐Ÿฏ

<a href="/kevinbfiscus/">Kevin Fiscus</a> will be speaking about how #CyberDeception enhances traditional security controls &amp; works with #ZTA, #CTI, &amp; #AdversaryEmulation. Don't miss this critical webcast!

Register now: sans.org/u/1lTR #SEC550 #ActiveDefense
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

๐Ÿฏ WATCH NOW ๐Ÿฏ Check out Kevin Fiscus speaking about how #CyberDeception enhances traditional security controls & works with #ZTA, #CTI, & #AdversaryEmulation. View here: sans.org/u/1lTR #SEC550 #ActiveDefense

๐Ÿฏ WATCH NOW ๐Ÿฏ

Check out <a href="/kevinbfiscus/">Kevin Fiscus</a> speaking about how #CyberDeception enhances traditional security controls &amp; works with #ZTA, #CTI, &amp; #AdversaryEmulation.

View here: sans.org/u/1lTR #SEC550 #ActiveDefense
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

Many security controls seek to stop or reduce #ransomware threats, but this has proven difficult. Fortunately, options are available even stopping the attack before it begins; #cyberdeception. Learn how to disrupt the ransomware kill chain. Register here: sans.org/u/1mqw

Many security controls seek to stop or reduce #ransomware threats, but this has proven difficult. Fortunately, options are available even stopping the attack before it begins; #cyberdeception. Learn how to disrupt the ransomware kill chain.

Register here: sans.org/u/1mqw
SANS APAC (@sansapac) 's Twitter Profile Photo

๐Ÿ“Œ Don't miss the opportunity to learn new #CyberSecurity skills at SANS South by South East Asia Feb 23, ๐Ÿ‡ฎ๐Ÿ‡ณ Bangalore. โคต๏ธ Course List: #SEC504 with Anurag Khanna #SEC550 with Kevin Fiscus #FOR509 with Josh Lemon ๐Ÿ”— Explore Courses and Register: sans.org/u/1nHS

๐Ÿ“Œ Don't miss the opportunity to learn new #CyberSecurity skills at SANS South by South East Asia Feb 23, ๐Ÿ‡ฎ๐Ÿ‡ณ Bangalore.

โคต๏ธ Course List:
#SEC504 with <a href="/khannaanurag/">Anurag Khanna</a>
#SEC550 with <a href="/kevinbfiscus/">Kevin Fiscus</a>
#FOR509 with <a href="/joshlemon/">Josh Lemon</a>

๐Ÿ”— Explore Courses and Register: sans.org/u/1nHS
AcalvioTech (@acalviotech) 's Twitter Profile Photo

Deception Strategy in Zero Trust Environments buff.ly/3KyGCIb Join us on March 9th for webinar with Imran Umar Booz Allen Hamilton & Kevin Fiscus SANS Institute to get an overview of zero trust architecture (ZTA) and how active defense based on deception technologies can support.

Deception Strategy in Zero Trust Environments buff.ly/3KyGCIb
Join us on March 9th for webinar with Imran Umar <a href="/BoozAllen/">Booz Allen Hamilton</a> &amp; <a href="/kevinbfiscus/">Kevin Fiscus</a> <a href="/SANSInstitute/">SANS Institute</a> to get an overview of zero trust architecture (ZTA) and how active defense based on deception technologies can support.
SANS Institute, EMEA (@sansemea) 's Twitter Profile Photo

Happening ๐Ÿ”œ in ๐Ÿด๓ ง๓ ข๓ ฅ๓ ฎ๓ ง๓ ฟ England | SANS London June 2023 | In-Person & Live Online Learn from the best๐Ÿ‘‡ #SEC504 with Kevin Fiscus #SEC401 with Nick Mitropoulos #FOR500 with Lee Whitfield โž• More Courses & Register: sans.org/u/1p23 #CyberSecurityTraining

Happening ๐Ÿ”œ in  ๐Ÿด๓ ง๓ ข๓ ฅ๓ ฎ๓ ง๓ ฟ England | SANS London June 2023 | In-Person &amp; Live Online

Learn from the best๐Ÿ‘‡
#SEC504 with <a href="/kevinbfiscus/">Kevin Fiscus</a>
#SEC401 with <a href="/MitropoulosNick/">Nick Mitropoulos</a>
#FOR500 with <a href="/lee_whitfield/">Lee Whitfield</a>

โž• More Courses &amp; Register:  sans.org/u/1p23

#CyberSecurityTraining
Anand Akela (@aakela) 's Twitter Profile Photo

Don't miss the webinar at 8AM PST webinar with Imran Umar Booz Allen Hamilton & Kevin Fiscus SANS Institute to get an overview of Zero Trust Architecture (ZTA) and how active defense based on deception technologies can support it.

AcalvioTech (@acalviotech) 's Twitter Profile Photo

Using Generative AI to create deceptions for Identity Protection acalvio.com/using-generatiโ€ฆ A blog by Satnam Singh, PhD discussing how Generative AI can be leveraged for cybersecurity, specifically for identity protection.

Using Generative AI to create deceptions for Identity Protection  acalvio.com/using-generatiโ€ฆ

A blog by <a href="/satnam74s/">Satnam Singh, PhD</a> discussing how Generative AI can be leveraged for cybersecurity, specifically for identity protection.
Ted Demopoulos (@teddemop) 's Twitter Profile Photo

Why does Kevin Fiscus say " if we achieved the goal of rapid detection and immediate response, we would actually be making out security worse and giving the attacker a significant advantage?" Join us and find out! #detectionengineering teddemop.webinarninja.com/live-webinars/โ€ฆ

Ted Demopoulos (@teddemop) 's Twitter Profile Photo

Today at 2PM Eastern. Recorded if you can't make it live so just signup if interested. I'm going to learning a few things from Kevin Fiscus and you can too! teddemop.webinarninja.com/live-webinars/โ€ฆ

Ted Demopoulos (@teddemop) 's Twitter Profile Photo

Detection Oriented Security Architecture, with Kevin Fiscus youtu.be/GeYcu75WzFE (due to popular demand, putting this great talk online!). It's taken awhile. Happily busy and jetlagged in Qatar. T #detection #blueteam #DetectionArchitecture #DetectionEngineering