Posted on
in Presentations
Cloud threat hunting is critical for proactively detecting and mitigating attacks on cloud and hybrid environments. Hackers leverage orchestration attacks, file synchronization poisoning, cross-tenant attacks, credential stuffing, and flaws in underlying architecture. Join this talk to learn effective cloud threat hunting tactics, including honeyclouds, integrated monitoring and behavioral analysis/AI.
Pre-Requisites: Understanding of common cloud architectures will be useful.
Pre-Requisites: Understanding of common cloud architectures will be useful.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community