Threat Hunting across Thousands of Multicloud Workloads

Posted on in Presentations

How do you know if your public-cloud environments are really safe? Based upon the latest research from the RedLock Cloud Security Intelligence Team this session will present tactics and tools for threat hunting across multiple public cloud environments. Get your hands dirty capturing the flag and learn the most effective countermeasures.

Learning Objectives:
1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.

Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.
Matthew Chiodi


Chief Trust Officer, Cerby

Gaurav Kumar


CTO, RedLock

Analytics Intelligence & Response

threat management security operations penetration testing incident response cloud security



Share With Your Community