Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=1slQNSkvjGw



Duration: 0:00
6 views
0


⬥GUEST⬥


Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/


⬥HOST⬥


Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com/


⬥EPISODE NOTES⬥


Sean Metcalf, a frequent speaker at conferences like Black Hat, DEF CON, and RSAC, brings a sharp focus to identity security—especially within Microsoft environments like Active Directory and Entra ID. In this episode, he walks through the practical and tactical role of honeypots and deception in detecting intrusions early and with higher fidelity.


While traditional detection tools often aim for broad coverage, honeypots flip the script by offering precise signal amidst the noise. Metcalf discusses how defenders can take advantage of the attacker’s need to enumerate systems and accounts after gaining access. That need becomes an opportunity to embed traps—accounts or assets that should never be touched unless someone is doing something suspicious.


One core recommendation: repurpose old service accounts with long-lived passwords and believable naming conventions. These make excellent bait for Kerberoasting attempts, especially when paired with service principal names (SPNs) that mimic actual applications. Metcalf outlines how even subtle design choices—like naming conventions that fit organizational patterns—can make a honeypot more convincing and effective.


He also draws a distinction between honeypots and deception technologies. While honeypots often consist of a few well-placed traps, deception platforms offer full-scale phantom environments. Regardless of approach, the goal remains the same: attackers shouldn’t be able to move around your environment without tripping over something that alerts the defender.


Importantly, Metcalf emphasizes that alerts triggered by honeypots are high-value. Since no legitimate user should interact with them, they provide early warning with low false positives. He also addresses the internal politics of deploying these traps, from coordinating with IT operations to ensuring SOC teams have the right procedures in place to respond effectively.


Whether you’re running a high-end deception platform or just deploying free tokens and traps, the message is clear: identity is the new perimeter, and a few strategic tripwires could mean the difference between breach detection and breach denial.


⬥SPONSORS⬥


LevelBlue: https://itspm.ag/attcybersecurity-3jdk3


ThreatLocker: https://itspm.ag/threatlocker-r974


⬥RESOURCES⬥


Inspiring Post: https://www.linkedin.com/posts/activity-7353806074694541313-xzQl/


Article: The Art of the Honeypot Account: Making the Unusual Look Normal: https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normal


Article: Trimarc Research: Detecting Kerberoasting Activity: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-kerberoasting-activity


Article: Detecting Password Spraying with Security Event Auditing: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-password-spraying-with-security-event-auditing


⬥ADDITIONAL INFORMATION⬥


✨ More Redefining CyberSecurity Podcast: 


🎧 https://www.seanmartin.com/redefining-cybersecurity-podcast.


Redefining CyberSecurity Podcast on YouTube:


📺    • Redefining CyberSecurity Podcast | Togethe...  


📝 The Future of Cybersecurity Newsletter:https://www.linkedin.com/newsletters/7108625890296614912/ 


Interested in sponsoring this show with a podcast ad placement? Learn more:


👉 https://itspm.ag/podadplcc




Other Videos By ITSPmagazine


2025-08-03When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025
2025-08-03Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat U...
2025-08-03From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat US...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream & the Last Stand of Creativity
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | With Theresa Lanowitz
2025-07-29Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Sto...
2025-07-29The Energy Transition: Not if, but When | Susan Hunt Stevens
2025-07-29ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-28ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Boo...
2025-07-27ThreatLocker Will Unveils Game-Changing Zero Trust Innovations at Black Hat 2025 | Booth #1933
2025-07-25From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurit...