Solution Summit Part 3: Threat Protection & Incident Response

Logo
Presented by

Aditya Sood, Blue Coat; Brandon Dunlap, Brightfly (Moderator)

About this talk

It is said that the bad guys follow the money (why do thief's rob banks? . . .). As valuable assets increasingly migrate to cloud infrastructure, there is a need for diligent protection of these assets. Malicious actors are less likely to attack the well-fortified back-end infrastructure of cloud app vendors, but rather pray on the human element to get in through the "front door". Compromised credentials via phishing attacks or other means or malware that highjacks a valid user session are some of the key threats that must be addressed in this new cloud landscape. This session will examine these and other threats, along with new approaches to address these at scale.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (138992)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.