top of page

Aamir Lakhani

Deception by Design


Aamir Lakhani - Security researcher

Lead Security Strategist & Global Director of Threat Intelligence


Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.


Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups.


Mr. Lakhani is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. He is the author or contributor of several books, and has appeared on FOX Business News, National Public Radio, and other media outlets as an expert on cybersecurity.


I'd like you to please discover the potency of deception technology as a formidable safeguard for organizations. This innovative approach involves creating fictitious assets, devices, and applications strategically designed to mislead potential attackers. By enticing adversaries to interact with deceptive elements, early detection becomes the cornerstone for prompt and effective mitigation, minimizing possible damage.

The speaker will delve into the multifaceted layers of deception technology, unraveling the intricacies of decoys, services, network deception, and deception token breadcrumbs. This session promises an exciting exploration beyond traditional honeypots, showcasing how deception technologies serve as a dynamic tool for identifying technical and skill gaps within an environment.


Attendees will gain insights into utilizing deception technologies to assess their cybersecurity readiness and recognize and respond to cyberattacks effectively. The discussion goes beyond theoretical exploration, featuring practical examples of how organizations have harnessed deception technologies to illuminate attacker techniques, uncover vulnerabilities in their security infrastructure, and pinpoint areas for employee skill enhancement.


Join us for an engaging session that goes beyond the surface, revealing the transformative potential of deception technologies in fortifying the cyber resilience of State government agencies.

Aamir Lakhani
bottom of page