Using deception to extract cyber threat intelligence
Intel 471Archived Mar 17, 2026✓ Full text saved
Tim Pappa is a former FBI supervisory special agent who specializes in deception techniques. In this Studio 471, he discusses what threat intelligence can be gained using deception and how organizations can structure scalable programs.
Full text archived locally
✦ AI Summary· Claude Sonnet
Using deception to extract cyber threat intelligence
Cyber deception involves various techniques to manipulate adversaries, whether it’s baiting them with fake resources or trapping them in frustrating loops. Tim Pappa is a former FBI supervisory special agent who specializes in deception techniques. In this Studio 471, Tim discusses what kinds of threat intelligence can be gained from deception techniques, its limitations, the Bell-Whaley framework and how organizations can start their own scalable deception programs.
Participants:
Tim Pappa, Incident Response Engineer - Cyber Deception Strategy, Content Development and Marketing, Wal-Mart
Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471