Posted on
in Presentations
How do you know if your public-cloud environments are really safe? Based upon the latest research from the RedLock Cloud Security Intelligence Team this session will present tactics and tools for threat hunting across multiple public cloud environments. Get your hands dirty capturing the flag and learn the most effective countermeasures.
Learning Objectives:
1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.
Pre-Requisites:
Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.
Learning Objectives:
1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.
Pre-Requisites:
Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.
Share With Your Community