Posted on
in Presentations
Cloud threat hunting is critical for proactively detecting and mitigating attacks on cloud and hybrid environments. Hackers leverage orchestration attacks, file synchronization poisoning, cross-tenant attacks, credential stuffing, and flaws in underlying architecture. Join this talk to learn effective cloud threat hunting tactics, including honeyclouds, integrated monitoring and behavioral analysis/AI.
Pre-Requisites: Understanding of common cloud architectures will be useful.
Pre-Requisites: Understanding of common cloud architectures will be useful.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community