Active Defense & Deception , Next-Generation Technologies & Secure Development

Using Deception Technology for Enhanced Threat Detection

GE's Prakash Padariya on Using the Technology to Support a Security Strategy
Prakash Padariya, CISO-Technology Center, GE

Deploying deception technology as an additional layer of defense at the initial stage of planning and budgeting will help organizations have better visibility into networks to detect threats, says, Prakash Padariya, CISO-Technology Center, GE.

See Also: How Can Mobile Banking Apps Fight Back?

"Deception technology architecture deployed at core infrastructure level will help analyze millions of logs in no time and provides minimal false positives," he says.

In a video interview at Information Security Media Group's recent Bengaluru Fraud & Breach Prevention Summit, Padariya discusses:

  • Myths around deception technology;
  • Enhancing visibility of networks and infrastructure through deception technology;
  • Deception as the additional layer of threat detection

Padariya has over 15 years of experience in cybersecurity and information security at GE, Royal Bank of Scotland, IBM, Target and Accenture. His professional experience spans across banking, finance, telecomm, and IT services industries in India, UK, Australia, Canada and EMEA countries. Padariya currently heads information and cybersecurity at GE's India technology center.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years' experience in newspapers, audio-visual media, magazines and research. She has an understanding of technology and business journalism, and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a Group Editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.