Posted on
in Presentations
How do you know if your public-cloud environments are really safe? Based upon the latest research from the RedLock Cloud Security Intelligence Team this session will present tactics and tools for threat hunting across multiple public cloud environments. Get your hands dirty capturing the flag and learn the most effective countermeasures.
Learning Objectives:
1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.
Pre-Requisites:
Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.
Learning Objectives:
1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.
Pre-Requisites:
Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.
Analytics Intelligence & Response
threat management security operations penetration testing incident response cloud security
Topic
Analytics Intelligence & Response
Subtopic
threat management
security operations
penetration testing
incident response
cloud security
Share With Your Community