Posted on
in Presentations
Attackers are using clouds to attack. Adversaries are learning how to co-opt resources and networks for crime and profit. This session will demonstrate how to detect compromised cloud infrastructure using cloud audit logs provided by the big three cloud providers. By unlocking the full potential of cloud network and API access logs, security operations can thrive in a multi-cloud environment.
Participants
Brandon Evans
Speaker
Senior Security Engineer / Certified Instructor, Zoom Video Communications / SANS Institute
Analytics Intelligence & Response Cloud Security
cloud security hackers & threats intrusion prevention/detection security operations anti-malware
Topic
Analytics Intelligence & Response
Cloud Security
Subtopic
cloud security
hackers & threats
intrusion prevention/detection
security operations
anti-malware
Share With Your Community