Using deception to catch Shai-Hulud‍
  ·  
Webinar / 3rd April
Sign up now
Product
Platform
AWS
AWS
Azure
Azure
CI/CD
CI/CD
Google Cloud
Google Cloud
Identity
Identity
Kubernetes
Kubernetes
Workstations
Workstations
Credentials & artifacts
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
PricingCustomers
Resources
  • ResearchAbout
  • Careers
  • Contact
Community Edition
Book a demoCommunity Edition
All posts
·
Product

Canaries in the Wild - Episode 4: Kevin Conley

Andy Smith

February 10, 2026

March 10, 2026

·

2

min read

I am the text that will be copied.
"Think like an attacker"

Our latest episode features Kevin Conley, Team Lead and Principal Security Engineer of the Deception Technology team at Riot Games, who has built their canary program from the ground up over the past few years.

Kevin has spent years deploying and running deception at massive scale - protecting one of the world's largest gaming platforms with hundreds of millions of players. He brings practical experience from building the program and operating it day-to-day.

Deception Terminology

A common misconception gets addressed early in the conversation: that deception is just honeypots. Kevin explains how this narrow view does a disservice to what detection teams can accomplish, and shares his perspective on security canaries and the value they deliver.

Adopting an Attacker's Perspective

The fundamental mindset shift that made Riot's program effective centers on deploying canaries where attackers will actually look, even if this creates more benign positives from engineers. Kevin explains that they aren't always negative – they can help your team understand how an environment is being used, particularly when you see more than expected.

Measuring What Matters

Riot's approach to measuring success focuses on tracking coverage across infrastructure, then validating effectiveness through blind red team exercises. The goal is catching attackers as early in the attack chain as possible, before they exfiltrate data.

The psychological effect of deception

Kevin discusses how attackers may not even touch insecure real files if they're aware that deception is in place, creating a powerful deterrent effect.

Listen to Episode 4 here.

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you for signing up
Something went wrong, please try again
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
Soc 2 Type 2 imageCheckmark imageAWS Qualified software illustration
Platform
AWS
Azure
CI/CD
Google Cloud
Identity
Kubernetes
Workstations
Credentials & artifacts
Use cases
AI Agent Detection
Cloud & Kubernetes Breach
Insider Threat Detection
Supply Chain & CI/CD Attack
Workstation Compromise
Company
CustomersResearchAboutCareersContactStatusCommunity Edition
Social
© 2026 Tracebit
Privacy PolicyTerms of ServiceCookie Settings