Special Webinar Event Poisoning the Well: How Deception Turns the Agentic Attack Surface Against the Attacker
Featuring
REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!
Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.
About This Webinar
AI-orchestrated attackers have one defining characteristic defenders have not yet fully exploited: they probe everything. The Anthropic GTG-1002 campaign demonstrated this in practice-an AI agent autonomously cataloging hundreds of services, mapping complete network topologies, and pursuing every viable exploitation path in parallel, with nearly 90% of the intrusion chain executed without human involvement. That exhaustiveness is the attacker's greatest advantage. It is also their most predictable vulnerability.
When an attacker has to probe an environment to understand it, every asset they touch becomes an opportunity for early detection. Modern deception platforms seed environments with decoys, honeytokens, breadcrumbs, and lures that mimic legitimate infrastructure — transforming reconnaissance itself into the moment of exposure. Defenders aren't waiting for attackers to make mistakes. They're building environments where any probing activity produces a confirmed, high-fidelity alert before a single real asset is compromised.
-
Host Mackenzie Putici Webinar Moderator, Future B2B
-
Featuring Amir Moin Staff Product Manager, Zscaler
Why You Should Join
- The Agentic Blind Spot: Why AI agents, precisely because they probe comprehensively and in parallel, are more likely to trigger deception assets than the cautious human attackers legacy detection was designed around.
- Poisoning the Well: How breadcrumbs and lures actively shape attacker behavior — guiding adversaries into instrumented terrain and away from real assets while generating real-time intelligence on their tools and objectives.
- Decoys Across the Kill Chain: How deception coverage spans endpoints, identity infrastructure, network services, and cloud environments to catch attackers at every stage of reconnaissance.
- Extending Coverage to AI Infrastructure: A look at MCP decoys and what agentic attack detection looks like as AI tooling becomes a primary intrusion target.