Main Content

State of Cloud Security

About the Talk

April 30, 2015 4:10 PM

Las Vegas, NV

Las Vegas, NV

Identifying specific tactics and malicious actors targeting the cloud has been a challenge for many reasons. For one, relatively little research has been done in tracking cloud attack vectors as a distinct category and a number of early cloud deployments have been done "off-the-books" from IT departments, leaving most security practitioners in the dark. How do you filter out the noise generated by the average script kiddie to find a legitimate attack against your environment? How do you use HoneyPot technologies deployed in large cloud providers to find targeted attacks against your infrastructure and data? What are the most prevalent attack vectors in the cloud? What commonalities are there in the malware being used? What networks are these attacks originating from? How are these malicious actors selecting their targets? Are cloud attacks materially different from those seen in traditional enterprise deployments? And Lastly, how do we defend against these attacks and profile our adversaries to build the proper defense in depth strategy to protect our cloud infrastructure? This session will help you answer these questions and more.

Ratings and Recommendations

This Talk hasn't been rated yet. Sign In to rate Talks.

comments powered by Disqus