Cloud workloads running on serverless infrastructure provide near zero visibility to security teams. Can security professionals inventory, scan and monitor an environment running thousands of functions for only 100 milliseconds? This technical session will examine real-world attacks and teach you how to enable security controls to defend your serverless infrastructure.
Pre-Requisites: General understanding of Cloud, Serverless, and DevOps concepts. Awareness of the OWASP Serverless Top 10 and Cloud security services, such as identity & access management, key management services, cloud networking stacks, and storage services.
Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.
Identity DevSecOps & Application Security Cloud Security & Virtualization Analytics Intelligence & Response
software code vulnerability analysis penetration testing incident response identity management & governance cloud security
Share With Your Community