Stealing the Silver Lining from your Cloud

Logo
Presented by

Anant Shrivastava (Notsosecure Global Services) // Don Shin (ExtraHop)

About this talk

The last couple of years have seen a tremendous growth in cloud adoption. Every organization has some cloud usage, using either a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organization's security landscape. Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organizations up to be more severely punished for their mistakes. In this demo filled webinar, we will discuss various scenarios where cloud based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved. We will look at ways to exploit these cloud environments from an attackers point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete ownage of the cloud network.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (99)
Subscribers (11630)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com