Multi-Cloud Anomaly Detection: Finding Threats Among Us in the Big 3 Clouds

Posted on in Presentations

Attackers are using clouds to attack. Adversaries are learning how to co-opt resources and networks for crime and profit. This session will demonstrate how to detect compromised cloud infrastructure using cloud audit logs provided by the big three cloud providers. By unlocking the full potential of cloud network and API access logs, security operations can thrive in a multi-cloud environment.

Brandon Evans


Senior Security Engineer / Certified Instructor, Zoom Video Communications / SANS Institute

Analytics Intelligence & Response Cloud Security

cloud security hackers & threats intrusion prevention/detection security operations anti-malware



Share With Your Community