Posted on
in Presentations
Cloud exfiltration and credentialed access incidents in cloud environments tend to resist detection and often go unnoticed until something else triggers an incident response. This session will summarize several years of working in cloud exfil hunting and detection using a combination of anomaly detection and conventional hunting queries implemented in a Jupyter Notebook.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community