BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//2026//N8H3CA
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-KZX7PR@cfp.nsec.io
DTSTART;TZID=EST:20260514T154500
DTEND;TZID=EST:20260514T161500
DESCRIPTION:Abstract:\nTraditional defensive measures alone are proving ins
 ufficient against determined adversaries. This talk introduces a systemati
 c approach to implementing effective deception solutions by using BloodHou
 nd's OpenGraph framework to map and deploy deceptive attack paths across A
 D and third-party enterprise technologies.\n\nThis talk moves beyond basic
  honeypots and canary tokens. This presentation demonstrates how to build 
 discoverable deceptions that actually entice attackers. We'll explore how 
 understanding existing attack paths in your environment is crucial to crea
 ting believable deceptions that adversaries will naturally encounter and a
 ttempt to exploit.\n\nKey Topics Covered:\n- Attack Path-Driven Deception 
 Design: Using attack path analysis to identify optimal deception placement
  points and create realistic adversary scenarios\n- OpenGraph for Deceptio
 n Mapping: Extending beyond Active Directory to model deceptive attack pat
 hs across Git repositories\, configuration management systems\, and cloud 
 services\n- Practical Implementation Examples: Live demonstrations includi
 ng AD CS deception using Certiception\, repo-based deceptions with GitHoun
 d\, infrastructure deceptions through AnsibleHound and SCCMHound
DTSTAMP:20260507T204337Z
LOCATION:Salle de bal
SUMMARY:Mapping Deception Solutions with BloodHound OpenGraph - Joshua Prag
 er\, Ben Schroeder
URL:https://cfp.nsec.io/2026/talk/KZX7PR/
END:VEVENT
END:VCALENDAR
