Multi-Cloud Anomaly Detection: Finding Threats Among Us in the Big 3 Clouds


Posted on in Presentations

Attackers are using clouds to attack. Adversaries are learning how to co-opt resources and networks for crime and profit. This session will demonstrate how to detect compromised cloud infrastructure using cloud audit logs provided by the big three cloud providers. By unlocking the full potential of cloud network and API access logs, security operations can thrive in a multi-cloud environment.


Participants
Brandon Evans

Senior Security Engineer / Certified Instructor, Zoom Video Communications / SANS Institute

Analytics, Intelligence & Response Cloud Security & Virtualization

cloud security hackers & threats intrusion prevention/detection security operations anti-malware


Topic

Subtopic


Share With Your Community