Posted on
in Presentations
One often overlooked but remarkably effective indicator for identifying breaches in cloud environments is the cost generated by cloud resources and when this cost strays from the norm. This presentation will dive into the intricacies of cloud billing and how it can be used to detect cyber breaches and fill in gaps in forensic timelines.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community