August 25
                    14:00–15:00
                    Kubernetes security: deception phase
                    
                    The deception phase of information systems security is often unjustifiably neglected. Even though it can be used to provoke an intruder, who is trying to infiltrate your system or has already done so, to expose themselves and thereby detect them.
Can this be done in Kubernetes? Of course, yes, and often using its own built‑in mechanisms, which makes it much easier to create deception in a cluster.
 
			