Special Webinar Event The 90-Day Mythos Mandate: Deploy Deception to Catch AI-Automated Attackers
Featuring
REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!
Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.
About This Webinar
Anthropic's Claude Mythos has arrived, and security teams are scrambling to determine their playbook in response. The Mythos AI model autonomously discovers critical vulnerabilities, generates working exploits without human guidance, and orchestrates attacks at a speed that collapses the window between exposure and breach from weeks to hours. The Cloud Security Alliance has responded with a strategy briefing with more than 80 leading CISOs and practitioners signing off on its guidance. In it, they issued 11 priority actions that every security program must take now, and among them: build a deception capability and do it in the next 90 days.
Deception technology has earned that designation because it is built for exactly how Mythos-class agents operate. AI attackers don't probe selectively. They probe everything, and that exhaustiveness makes them reliably detectable. Every interaction with a decoy, honeytoken, or lure is a confirmed detection signal. This webinar translates the CSA's mandate into practice: what a deception capability looks like in a Mythos-ready security program, and how to build it in time.
-
Host Mackenzie Putici Webinar Moderator, Future B2B
-
Featuring Amir Moin Principal Product Manager, Zscaler
Why You Should Join:
- The CSA's 90-Day Mandate: Why the Cloud Security Alliance classified deception as a HIGH-priority control, and what building this capability actually requires before the window closes.
- Why Agentic Attackers Trigger Deception: Mythos-class agents probe comprehensively and in parallel, which are behaviors nearly certain to engage deception decoys
- Poisoning the Well: How breadcrumbs and lures actively shape adversary behavior, guiding threat actors into instrumented terrain and away from real assets while generating real-time intelligence on attacker tools and objectives.
- Coverage Across the Kill Chain: How deception spans endpoints, identity infrastructure, network services, cloud environments, and emerging AI infrastructure- including MCP server decoys purpose-built for the agentic attack surface.