Stealing the Silver Lining from your Cloud

Logo
Presented by

Anant Shrivastava (Notsosecure Global Services) // Don Shin (ExtraHop)

About this talk

The last couple of years have seen a tremendous growth in cloud adoption. Every organization has some cloud usage, using either a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organization's security landscape. Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organizations up to be more severely punished for their mistakes. In this demo filled webinar, we will discuss various scenarios where cloud based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved. We will look at ways to exploit these cloud environments from an attackers point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete ownage of the cloud network.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (105)
Subscribers (12374)
ExtraHop is reinventing network detection and response (NDR) to help enterprises stay ahead of emerging threats with unparalleled network visibility, context, and control. As new attack vectors rapidly emerge, SOCs face an escalating challenge: Expand visibility to effectively detect and respond to threats, enhance productivity to manage the increased volume, and do it all while reducing operational complexity. By combining the power of NDR with network performance management (NPM), intrusion detection (IDS), and packet forensics in a single, integrated platform, enterprises benefit from complete visibility and contextual insights across their entire hybrid infrastructure - from data center campuses to cloud and SASE infrastructures and beyond. ExtraHop can decrypt and unlock packet-level data at wire speeds, analyzing and correlating it with its cloud-scale machine learning models to detect, investigate, and remediate cyber risks in real-time, without the added complexity of multiple tools. Unlock the full power of network detection and response with ExtraHop today. Learn more at www.extrahop.com