Cloud Defender: Detecting and Responding to Adversaries in AWS


Posted on in Presentations

Get first-hand experience with cloud penetration techniques, see what they look like and learn how to defend against them. You will use the provided template to spin up an example AWS environment in your account, hack it using scripts and watch the attack unfold in real time. Use evidence from the attack to create automated countermeasures. Leverage built-in AWS services to detect signs of compromise.

Learning Objectives:
1: Experience examples of real-world advanced public cloud hacking.
2: Learn ways to detect public cloud hacking by combining weak signals.
3: Get templates to create a hack lab in your own cloud and see for yourself.
Participants
Martin Holste

Participant

CTO, Cloud, FireEye, Inc.

Paul Lee

Participant

Senior Cloud Solutions Engineer, FireEye, Inc

Josh Madeley

Participant

Principal Consultant, FireEye


Share With Your Community