Avoid Becoming a Victim of Cryptojacking

Logo
Presented by

Michael Clark, Dir. Threat Resrch; Nicholas Lang, Threat Resrcher; Michael Isbitski, Dir. CS Strategy; B. Dunlap, Moderator

About this talk

Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even containers are being used for evil as attackers’ plant unpleasant surprises in public repositories, exposing you and your business to potential supply chain compromise. On January 26, 2023 at 1 p.m. Eastern/10:00 a.m. Pacific join Sysdig and (ISC)2 to learn what you can do to protect yourself. We look forward to discussing: -What types of attacks are popular in the cloud and why. -How cryptojacking works and how to avoid becoming a victim. -What can be hiding in malicious Docker images and how to protect yourself.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (138945)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.