Using Deception Technology for Enhanced Threat DetectionGE's Prakash Padariya on Using the Technology to Support a Security Strategy
Deploying deception technology as an additional layer of defense at the initial stage of planning and budgeting will help organizations have better visibility into networks to detect threats, says, Prakash Padariya, CISO-Technology Center, GE.
See Also: Why CASBs Matter to Cloud Security
"Deception technology architecture deployed at core infrastructure level will help analyze millions of logs in no time and provides minimal false positives," he says.
In a video interview at Information Security Media Group's recent Bengaluru Fraud & Breach Prevention Summit, Padariya discusses:
- Myths around deception technology;
- Enhancing visibility of networks and infrastructure through deception technology;
- Deception as the additional layer of threat detection
Padariya has over 15 years of experience in cybersecurity and information security at GE, Royal Bank of Scotland, IBM, Target and Accenture. His professional experience spans across banking, finance, telecomm, and IT services industries in India, UK, Australia, Canada and EMEA countries. Padariya currently heads information and cybersecurity at GE's India technology center.