Using deception to catch Shai-Hulud‍
  ·  
Webinar / 20th February
Sign up now
CustomersPricingResearchAboutCareersContactCommunity Edition
Company
  • About
  • Careers
  • Contact
Book a demo
Book a demo

Book a demo

See how canaries can enhance your security

Photo of Andy Smith

Andy Smith

CEO, Tracebit

Photo of Sam Cox

Sam Cox

CTO, Tracebit

Schedule a 45 minute personalised demo of Tracebit with one of our co-founders to:

  • Discuss your specific security challenges
  • Cover the range of canaries Tracebit can deploy for your use case
  • Walk through a simple Tracebit deployment

One of our co-founders will reply to you directly as soon as they see your request. No bots here! So please be patient if it takes us a few hours to get back to you.

Thank you for contacting us; a member of our team will be in touch shortly.
Oops! Something went wrong while submitting the form.
Community edition
All posts
Product

Canaries in the Wild - Episode 4: Kevin Conley

Andy Smith
February 10, 2026
February 10, 2026
·
2
min read
I am the text that will be copied.
"Think like an attacker"

Our latest episode features Kevin Conley, Team Lead and Principal Security Engineer of the Deception Technology team at Riot Games, who has built their canary program from the ground up over the past few years.

Kevin has spent years deploying and running deception at massive scale - protecting one of the world's largest gaming platforms with hundreds of millions of players. He brings practical experience from building the program and operating it day-to-day.

Deception Terminology

A common misconception gets addressed early in the conversation: that deception is just honeypots. Kevin explains how this narrow view does a disservice to what detection teams can accomplish, and shares his perspective on security canaries and the value they deliver.

Adopting an Attacker's Perspective

The fundamental mindset shift that made Riot's program effective centers on deploying canaries where attackers will actually look, even if this creates more benign positives from engineers. Kevin explains that they aren't always negative – they can help your team understand how an environment is being used, particularly when you see more than expected.

Measuring What Matters

Riot's approach to measuring success focuses on tracking coverage across infrastructure, then validating effectiveness through blind red team exercises. The goal is catching attackers as early in the attack chain as possible, before they exfiltrate data.

The psychological effect of deception

Kevin discusses how attackers may not even touch insecure real files if they're aware that deception is in place, creating a powerful deterrent effect.

Listen to Episode 4 here.

Table of contents
Subscribe to our newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to our privacy policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to newsletter

Subscribe to receive the latest research and product updates to your inbox every week.

By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The latest security research straight to your inbox

Subscribe to our newsletter to receive regular updates from our research and product teams

By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition.
Oops! Something went wrong while submitting the form.
AboutBlogContactCareersStatusTrust & Security
Subscribe for research and product updates
Subscribe
By subscribing you agree to our privacy policy
Thank you! Check your inbox for your first edition
Oops! Something went wrong while submitting the form.
© 2026 Tracebit. All rights reserved.
Privacy PolicyTerms of ServiceCookie Settings
AWS Qualified SoftwareSOC 2 Type 2