Michael Clark, Dir. Threat Resrch; Nicholas Lang, Threat Resrcher; Michael Isbitski, Dir. CS Strategy; B. Dunlap, Moderator
Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even containers are being used for evil as attackers’ plant unpleasant surprises in public repositories, exposing you and your business to potential supply chain compromise.
On January 26, 2023 at 1 p.m. Eastern/10:00 a.m. Pacific join Sysdig and (ISC)2 to learn what you can do to protect yourself. We look forward to discussing:
-What types of attacks are popular in the cloud and why.
-How cryptojacking works and how to avoid becoming a victim.
-What can be hiding in malicious Docker images and how to protect yourself.