Hi [[ session.user.profile.firstName ]]

Achieving Cloud Visibility With Cloud-Native Network Detection & Response

Without native network visibility in the cloud, enterprises have been limited to log or agent centric tools to support their cloud migration and to secure their workloads, making it challenging to detect and investigate complex threats in a timely manner. The introduction of Microsoft Azure V-Tap and Amazon VPC Traffic Mirroring finally provides access to context-rich network data for threat detection, investigation and response.

Join this webinar to learn how to gain visibility in your cloud workloads by leveraging the new network tap features released by the leading public cloud providers. During this session, Amelie Darchicourt, Cloud Product Marketing Manager at ExtraHop, will present the benefits of adopting a cloud-first approach to Network Detection and Response (NDR) and will share insights about how SecOps teams can hold up their side of the shared responsibility model and deliver unified security across the hybrid attack surface.
Recorded Aug 29 2019 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amelie Darchicourt, Cloud Product Marketing Manager & Eric Thomas, Director of Cloud Product Marketing, ExtraHop
Presentation preview: Achieving Cloud Visibility With Cloud-Native Network Detection & Response
  • Channel
  • Channel profile
  • Top 5 Latest Cloud Security Hacks and How You Can Avoid Them Mar 17 2020 4:00 pm UTC 60 mins
    Roger Grimes, Data-Driven Defense Evangelist Roger Grimes at KnowBe4
    Most people know that cloud security overall is often better than traditional on-premise security. However, that doesn’t mean that cloud products can’t be hacked or misconfigured even if you are using the best security practices. Social engineering is the number one threat to your cloud security that nobody is talking about, and your users are the last line of defense against these hacks!

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, as he breaks down the ways that bad actors can get around even the most up-to-date cloud security defenses and what you can do to keep your cloud safe. He’ll discuss:

    - Top 5 hacks the bad guys can use to get around your cloud security defenses
    - How to defend your organization against these hacks
    - The role that your users play in an effective defense strategy
    - How to spot (and stop) these types of attacks before it’s too late

    Attend this webinar to learn about various cloud hacks and how they compromise security, and what you can do to help better defend against them!
  • The Underrated Link Between Malicious Code & Cloud Security Recorded: Feb 18 2020 42 mins
    Itai Tevet, CEO at Intezer
    In order for an adversary to conduct a successful cyber attack and inflict any kind of damage, they must run malicious code or commands on a victim’s machine. This fact also holds true in the world of modern cloud infrastructure, which usually comprises numerous Linux servers, containers and other services that can potentially run unauthorized software.

    While there's a lot of publicly available information about securing the CI/CD process and pre-runtime scans, in this webinar, we will focus on best practices for securing your workloads in runtime. We will further explain how monitoring code in-memory can help to detect and quickly respond to cyber threats in public or private cloud servers.
  • Re-thinking vulnerability management in the era of Hybrid IT & DevOps Recorded: Feb 13 2020 58 mins
    Prateek Bhajankam,VP of Product Management & Badri Raghunathan, Director of Product Management at Qualys
    The digital transformation through Hybrid IT and DevOps has fundamentally changed how organizations operate – with major security implications. How do companies detect and manage vulnerabilities when the enterprise network constantly evolves, and code written this morning gets deployed this afternoon? This requires enterprises to take a proactive, continuous and automated approach to security. Join this session to learn from industry experts on how enterprises should approach vulnerability management and take a wholistic approach that goes beyond traditional metrics. The speakers will detail how enterprises can implement a fully integrated vulnerability workflow – from asset inventory/discovery to vulnerability detection to prioritization and finally to remediation and patching.
  • Zero Trust and the Flaming Sword of Justice Recorded: Feb 11 2020 55 mins
    Dave Lewis, Global Advisory CISO, Duo Security (now part of Cisco)
    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind, defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify."
  • Rethinking DLP as You Move to the Cloud Recorded: Jan 30 2020 58 mins
    Justin Collins, Senior Director of Professional Services, Proofpoint & Jim Reavis, CEO, CSA
    Whether it’s financial, bank or credit card data, customer or patient information, or intellectual property, the goal of cybersecurity is to protect sensitive data and prevent unwanted access or theft. Legacy DLP solutions often fall short of that goal when you move to the cloud. With the adoption of SaaS applications such as Office 365, G Suite, Slack or Box, the cloud has become the other major channel of data sharing next to email. Securing access to a cloud app such as Office 365 in itself presents a new and significant challenge, let alone protecting sensitive data in the cloud. It is time to rethink DLP and adopt a solution that can unify DLP for email and cloud apps, but is also risk-aware. How can you better your approach in 2020?

    Join us as Proofpoint’s Senior Director of Professional Services, Justin Collins and CSA's CEO, Jim Reavis, discusses the steps for you to consider when transforming your DLP solution. In this session you will learn:
    - How to better discover and protect your organization’s sensitive data with CASB
    - How to unify DLP incident management for cloud apps, email and more
    - How to better identify sensitive data exposures and ex-filtration when an account is compromised
  • How NDR Powers Event-Driven Security in the Cloud Recorded: Jan 28 2020 44 mins
    Ryan Davis, Senior Manager, Cloud Product Marketing & Vince Stross, Principal Security SE at ExtraHop
    For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes detect-and-respond capabilities.

    In this webinar, we’ll dig into how network detection and response (NDR) can power event-driven security in the cloud. Topics will include:
    - How virtual taps enable agentless NDR in the public cloud
    - How NDR completes Gartner’s SOC Visibility Triad in the cloud
    - How NDR can be used for response automation
  • Anatomy of a Cloud Data Breach Recorded: Jan 23 2020 49 mins
    Bob Gilbert; Chief Evangelist, Netskope
    Cloud adoption is exploding with nearly 1,300 cloud apps in use in an average enterprise. From suites like Office 365 to collaboration tools like Slack, the cloud has enabled new levels of productivity resulting in enterprises gaining strategic advantages. Enterprises are not the only
    ones benefitting from cloud adoption. Bad actors are using the cloud to bypass legacy defense mechanisms and harvest credentials, deliver malicious payloads, and steal data. Join this informative session to learn about a couple of recent cloud data breaches and dissect how these breaches occurred and best practices to reduce the chance it will happen to your organization. You will learn:

    • About new attack scenarios that involve using the cloud to bypass traditional security tools
    • How the cloud-enabled kill chain forces a rethinking of how to defend against threats such as Clouphishing and data exfiltration
    • 5 steps to protect against cloud threats
  • A Strategic Approach to IoT Security Best Practices and Standards Recorded: Jan 16 2020 50 mins
    Brian Russell, Co-chair, CSA IoT Working Group & Gonda Lamberink, Global Senior Business Development Manager, UL
    The market for IoT products continues to expand, with increased quantities of devices being integrated into consumer and business networks.  These products are turning into always-on services that incorporate cloud connectivity and expose many points of interconnection.  Automation is beginning to take hold on top of this layer of pervasive connectivity and users are becoming ever more reliant on workflows enabled by these systems. Even as the reliance on IoT systems continues to increase, manufacturers are still not getting cybersecurity right.  There are still far too many instances where even basic security controls are not enforced in IoT products.  This is concerning especially given the adoption of safety-critical and health-critical devices being introduced onto the market, and growing risk of data breaches and related security compromises next to an increasing prevalence of botnets and large-scale automated, distributed attacks. 

    As the future unfolds, the ‘attack surface’ will only grow larger and the public will be put at increasing risk if strategic changes do not occur immediately.  To this extent, UL and the Cloud Security Alliance (CSA) have partnered to better understand the current state of IoT cybersecurity regulations, standards and best practices through primary research.  Our aim is to identify gaps in coverage that could lead to deployment of insecure IoT services and systems.  In this webinar, we will share the results of that research and discuss our strategic approach to fixing the current state of IoT security based on constant collaboration between industry stakeholders, government agencies and enterprise users.
  • Getting Real: Sorting What’s ZT and What’s Just BS Recorded: Jan 14 2020 45 mins
    Wendy Nather, Head of Advisory CISO, Duo Security
    The buzz around zero-trust security has grown to a roar, but how do you pick out the useful tidbits and tactics from a heaping haystack of F.U.D.? Join Wendy Nather, Head of Advisory CISO Team at Duo Security, for an entertaining and informative session on what makes zero-trust methods key to the successful defense of an extended enterprise environment, why it’s not a silver bullet or a shiny product to buy, and how to sort the methodology from the manure
  • Rethinking Threat Intelligence with the LEAD Framework Recorded: Dec 19 2019 57 mins
    Filip Stojkovski, Threat Intelligence Manager, Adobe
    Adobe has been using threat intelligence for many years as part of the SOC, Incident Response, and Threat Hunting teams. But how do you start applying threat intelligence techniques and models to security efforts outside of these traditional areas? To help try and accomplish this, Adobe has created the 'LEAD' Treat Intelligence framework. It is based upon a unique maturity model that combines machine learning with automation and security orchestration.

    Join this webcast to learn how Adobe developed the LEAD model and how they are using it to both advance our existing threat intelligence operations as well as help solve a broader set of cloud security problems.
  • The Scary and Honest Truth About Securing the Public Cloud Recorded: Dec 17 2019 60 mins
    Bill Prout, Director of Global Public Cloud, Sophos
    Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power.

    Join this webcast to learn valuable tips to help your organization solve the toughest challenges around public cloud security.
    - Close hidden gaps in cloud security
    - How to automate security at the pace of DevOps
    - Shrink incident response times to prevent cyberattacks and compliance penalties
  • Automating Firewall Change Requests Recorded: Dec 12 2019 46 mins
    Ben Chinoy, Security Researcher, Adobe & Jason Joy, Sr. Enterprise Security Engineer, Adobe
    As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to continue to delight our customers. But one of the major challenges is in helping to ensure that the firewall change requests to support their work happen efficiently and securely. They receive hundreds of access requests each month for access to services. However, manually reviewing each one can be a time-consuming process that comes with the risk of human error. Adobe set out to try and mitigate this potential risk by automating as much of the process as possible.

    This webcast Ben Chinoy, Security Researcher at Adobe and Jason Joy, Senior Enterprise Security Engineer at Adobe, will discuss the issues they faced in automating this common process in cloud app development securely and introduce the tooling they developed to assist.
  • Cyber criminals are adopting cloud services just as rapidly as the rest of us! Recorded: Dec 10 2019 54 mins
    Paolo Passeri - Cyber Intelligence Principal; Neil Thacker - CISO EMEA; & Ross Asquith - Security Transformation Principal
    Join Netskope for a 45 minute webinar, looking at the dark side of cloud - where it’s used not by respectable enterprises like yours, but instead by cyber criminals intent on attacking your respectable enterprise.

    It’s not surprising that cyber criminals are embracing the cloud, they’re after the same benefits that you are, such as scalability, business continuity, reliability, and reduced costs. Your organisation is adopting cloud, and this means opening up access to those same cloud environments used by cyber criminals and hackers. So, how do you make sure you’re not inadvertently opening a backdoor that allows your organisation to be compromised?

    On this webinar Netskope’s expert panel will provide:
    -Insight into the rapidly growing cloud threat landscape, and an overview of the cloud-enabled kill chain.
    -A live demonstration of how cyber criminals are using cloud to successfully deliver threats, and then also remotely control compromised machines using popular cloud services.
    -Guidance on how to ensure your employees are not accessing high risk cloud applications, and that they are only accessing your instances of cloud services.
  • Network Security’s Future is in the Cloud Recorded: Dec 3 2019 52 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access, Palo Alto
    Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We believe that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.

    Join this discussion with Jason Georgi, Field CTO for Prisma Access at Palo Alto Networks, and explore best practices to secure your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud.
  • Rethink Infrastructure Access with Zero Trust Recorded: Nov 21 2019 57 mins
    Ivan Dwyer, Product Marketing, Okta & Dr. Chase Cunningham, Principal Analyst, Forrester
    As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic infrastructure environment requires smart access controls; but how do you adhere to your security policies without limiting automation?

    Join this webinar to learn how to effectively secure server access by applying the core principles of Zero Trust and enforce strict just-in-time, least privilege access in a manner that doesn't get in the way of productivity.

    Featured guest Dr. Chase Cunningham, principal analyst for Forrester Research, and Ivan Dwyer from Okta will discuss:
    - Why you need to re-think your infrastructure access approach
    - Why identity is the cornerstone of securing server access
    - How to put Zero Trust in practice across the infrastructure layer
    - Why secure server access is a strong “tip of the spear” use case for larger Zero Trust initiatives
  • Incorporating Identity in Your Security and Zero Trust Strategies Recorded: Nov 19 2019 54 mins
    Joe Gottlieb, SVP of Strategy and Business Development, SailPoint & Erik Bartholomy, Security Architect, LogRhythm
    Experts predict that total losses related to cybercrime will reach $6 trillion in 2021. The weapon of choice has been compromised identity and yet security teams run for the door when discussing identity and access management. The rapid adoption of cloud and mobile is forcing organizations to rethink their security model, with Zero Trust generating the most noise these days. In this webinar, we’ll explore how the emerging intersection of identity and security can reduce the risk of a breach (and the resulting financial and reputational losses) and enable a modern day Zero Trust approach.

    The Identity Defined Security Alliance is dedicated to helping organizations improve their security posture through identity-centric security strategies, education and frameworks. Join Joe Gottlieb, IDSA Executive Board Member and SailPoint SVP of Strategy and Corporate Business Development and Erik Bartholomy, LogRhythm Security Architect, to learn how:
    - You can make identity and security work better together
    - Identity-centric security is redefining Zero Trust
    - LogRhythm was able to fully transition to the cloud, eliminate infrastructure (VPNs, firewalls and directories) and become more secure
  • Cloud Security Fails of 2019 and Where to Focus in 2020 Recorded: Nov 14 2019 58 mins
    Fernando Montenegro, Principal Analyst, 451 Research and Rachel Pepple, Cloud and Security Marketer, ExtraHop
    Security has become one of the most pressing issues for organizations that are moving to the cloud. In this webinar, industry analyst Fernando Montenegro from 451 Research and Rachel Pepple from ExtraHop will take us through the cloud security journey that many enterprises have been on during the past years, looking at the realities of the high points and low points. Based on this look back, Rachel and Fernando will then pivot to what organizations can expect in 2020, where investments should be made, what trends should be closely monitored, and what best practices security teams should consider for a stronger security posture in the cloud.
  • Reimagine Your Perimeter Recorded: Nov 7 2019 57 mins
    Bob Gilbert, Vice President and Chief Evangelist, Netskope
    Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models obsolete. This shift is resulting in enterprise security teams supplementing next-gen firewalls (NGFWs), secure web gateways (SWGs), and VPNs with cloud access security brokers (CASBs). 

    While CASBs address a key set of cloud-specific use cases tied to visibility, data security, compliance, and threat protection, your dissolving corporate perimeter is also forcing security teams to rethink their entire legacy security stack. After all, if most of your web traffic is comprised of cloud services, why does a majority of your security spend on security tools that are not effective in this new world?
    Join this session to learn about:
    - New blind spots that exist with legacy security tools
    - Why simply moving legacy security tools to the cloud is not enough
    - Top cloud security use cases driving the need for a new perimeter
    - The essential requirements for a new, more effective perimeter
  • Is Your Business Audit-Ready? 3rd Party Risk Management Best Practices Recorded: Nov 5 2019 59 mins
    Kelsey Naschek, CIPP/E, CIPM, Privacy Engineer at OneTrust
    As the regulatory landscape for data privacy, security, and third-party risk management continues to change rapidly, so do the needs of the businesses that need to comply with the laws. Many organizations are still unsure of how to best tackle their most challenging tasks to not only maintain compliance internally, but across their third and fourth party relationships as well. In this webinar we'll cover the following:
    - How to streamline third-party risk management for compliance with major regulations like GDPR, CCPA, OCC, etc.
    - The key requirements of major third-party risk management regulations and standards
    - What activities should be completed to prepare for third-party risk compliance
  • Transformation of Cybersecurity Risk Recorded: Oct 31 2019 55 mins
    Alex Heid the Chief Research & Development Officer at SecurityScorecard
    The cyber landscape is continuing to evolve, and we're seeing digital trends continue to change. Digital technologies are accelerating the ability to do business, and really digitizing everything. In some ways, it's becoming quite common and helping people grow, fast. But at the same time, it raises incredibly significant challenges about cyber security risk, and challenges the way that we should structure our programs - safely. Join us as we discuss how organizations deal with cyber security risk, how they can influence others - all while evolving and transforming their own programs.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. It also allows audience members the opportunity to earn (ISC)2 CPE Credits.

Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa, @CSAResearchGuy

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Achieving Cloud Visibility With Cloud-Native Network Detection & Response
  • Live at: Aug 29 2019 4:00 pm
  • Presented by: Amelie Darchicourt, Cloud Product Marketing Manager & Eric Thomas, Director of Cloud Product Marketing, ExtraHop
  • From:
Your email has been sent.
or close