Hi [[ session.user.profile.firstName ]]

Security Considerations for Cloud Migration During a Crisis

Accelerating Cloud Adoption - The Time is Now

An evolving technology landscape can already make a well planned cloud migration strategy seem like a complex task, but as we’ve learned in the past few months, there are often additional challenges thrown into the works. This can lead to business needing to accelerate plans at a time when operational activities are already more difficult. How can you be sure you’re taking the necessary precautions pre-, during and post-migration?

On this live webcast, Rob Harrison, chief product officer at Capsule8, and guest speaker, Andras Cser, vice president and principal analyst at Forrester Research, will discuss how security considerations for a cloud migration have changed over the past few months and how future trends change risk when adopting accelerating strategies. Rob and Andras will discuss the challenges from both a business execution level and a cybersecurity level and how to mitigate those risks. Attendees of this live webcast will learn:

- Pre, during and post migration strategies
- Business level vs. cyber risk
- How different business verticals are utilizing cloud migration strategies as an opportunity for growth
- Geographical trends and compliance considerations
Recorded Jul 28 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Harrison, Chief Product Officer, Capsule8 and guest speaker, Andras Cser, VP & principal analyst at Forrester Research
Presentation preview: Security Considerations for Cloud Migration During a Crisis

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Serverless Security: Doing More with Serverless Mar 24 2021 5:00 pm UTC 60 mins
    Ryan Petrich, VP of Architecture, Capsule8
    Serverless architecture is an appealing prospect to developers in that it reduces maintenance, cost, testing, and operational overhead. Much of the pomp and circumstance of managing the infrastructure shifts to the cloud provider so that organizations can focus on building their services rather than scaling them and keeping them running. But, as with all new or evolving technologies, there are security implications and considerations that can give security teams pause and serverless applications should be viewed differently from traditionally deployed or containerized services.

    In this interactive session, Ryan Petrich, VP of Architecture at Capsule8, will define serverless as well as explore some of the key benefits of deploying this type of infrastructure with a focus on the impact to an organization’s attack surface. Ryan will dig into some of the key security challenges, including visibility and observability of serverless applications, as well practical tools and approaches to help overcome them and a live demonstration of example attacks to watch out for when choosing such an architecture.

    Attendees of this webcast will learn:

    - What a serverless architecture is and why security teams should care
    - Key security challenges for serverless deployments
    - Attack vectors and security threats unique to serverless architectures
    - Practical solutions for overcoming serverless security challenges
  • Linux Tracing - Do You Know What Your Servers Are Actually Doing? Recorded: Feb 17 2021 48 mins
    Nick "Ghost" Gregory
    There's a whole world of system tracing, instrumentation, and profiling built into nearly every Linux system that goes untouched by most. While originally developed to help with debugging and performance tuning, the same tools can be used to provide security insights that are difficult or almost impossible to get any other way. In this interactive session we will discuss these tracing systems, suggest tips on how to use them, and provide some actionable takeaways on types of data you can extract, all in just a few lines of code.

    This webcast is designed for developers and systems administrators who run Linux systems and want more visibility into what those systems are doing, either for performance reasons, or for security (or both!).

    During this webcast you will learn:

    - Best practices on how to use the `perf` cli to gather profiling information on applications.
    - Top tips on how to use Linux kprobes and uprobes to instrument specific functions in the kernel or userland.
    - How to implement a simple script to monitor the DNS requests and TCP connections made by any program on the system.
  • Coffee and Capsule8: Tales from the Cryptomining Recorded: Dec 8 2020 48 mins
    Kelly Shortridge and Ryan Petrich
    If you're curious about cryptomining and are interested in learning what it is, how folks are doing it, and how it could be impacting your organization (like that unexpected AWS bill!), join our live webcast series: Coffee and Capsule8: Tales from the Cryptomining.

    Register now and when you attend we will send you either a Starbucks gift card to keep you caffeinated OR make a donation for City Harvest (your choice!) while Capsule8 VP of Product Management and Product Strategy, Kelly Shortridge, explores the emergence of cryptomining and what risks it brings to your organization. Capsule8 VP of Architecture Ryan Petrich will then demonstrate what a cryptomining attack may look like in your organization and how Capsule8 detects it. We'll provide practical tips on responding if you catch this type of activity and field a live Q&A to address any additional questions.

    The Curious Case of a Kibana Compromise: https://capsule8.com/blog/the-curious-case-of-a-kibana-compromise/
  • Security Considerations for Cloud Migration During a Crisis Recorded: Nov 19 2020 51 mins
    Rob Harrison, Chief Product Officer, Capsule8 and guest speaker, Andras Cser, VP & principal analyst at Forrester Research
    Accelerating Cloud Adoption - The Time is Now

    An evolving technology landscape can already make a well planned cloud migration strategy seem like a complex task, but as we’ve learned in the past few months, there are often additional challenges thrown into the works. This can lead to business needing to accelerate plans at a time when operational activities are already more difficult. How can you be sure you’re taking the necessary precautions pre-, during and post-migration?

    On this live webcast, Rob Harrison, chief product officer at Capsule8, and guest speaker, Andras Cser, vice president and principal analyst at Forrester Research, will discuss how security considerations for a cloud migration have changed over the past few months and how future trends change risk when adopting accelerating strategies. Rob and Andras will discuss the challenges from both a business execution level and a cybersecurity level and how to mitigate those risks. Attendees of this live webcast will learn:

    - Pre, during and post migration strategies
    - Business level vs. cyber risk
    - How different business verticals are utilizing cloud migration strategies as an opportunity for growth
    - Geographical trends and compliance considerations
  • The ABCs of PMCs for Attack Detection Recorded: Sep 23 2020 48 mins
    Nick Gregory, Research Scientist, Capsule8 and Harini Kannan, Data Scientist, Capsule8
    A deep dive into novel hardware performance counters and how we use ML to sift through them.

    Hardware Performance Counters constitute a treasure trove of data, which surprisingly remains pretty much untouched by modern research, except for a few well known counters. In recent years, exploits like Spectre and Rowhammer and general techniques like Return Oriented Programming (ROP) were detected using hardware performance counters (HPCs). But to date, only relatively simple and well-understood counters have been used, representing just a tiny fraction of the information we can glean from the system.

    In this webinar, we’ll show how we used ML to find non-intuitive counters to build much more effective detection models against cache side channel attacks than ones previously tested in the industry. These new models are more accurate than prior cache-miss based models, and harder for attackers to bypass. We’ll also discuss the undocumented performance counters that we found as part of our Blackhat 2020 research, and the various attacks that models built with them could detect.
  • Deciphering SOC 2 Compliance in Cloud-Native Environments Recorded: Aug 27 2020 47 mins
    Cynthia Burke
    How did a fairly straightforward endeavor – an IT audit – become that monster under the bed?

    Compliance projects all too often feel a massive box checking exercise. You may be pulling staff and co-workers into a vast abyss, mapping arcane compliance controls, deciphering audit speak, all to hopefully pass an audit and maybe shore up security. So how can you, the IT experts, quickly tease out the essence of what an auditor needs to give them confidence that you have passed an audit?

    In this presentation we will use the example of a SOC 2 Type 1 audit in a cloud-native environment to demystify all of the dots, dashes and control numbers, giving you a high level roadmap of key elements required to pass your own SOC 2 audit regardless of where you are on your cloud native or compliance journey.
  • Security Considerations for Cloud Migration During a Crisis Recorded: Jul 28 2020 52 mins
    Rob Harrison, Chief Product Officer, Capsule8 and guest speaker, Andras Cser, VP & principal analyst at Forrester Research
    Accelerating Cloud Adoption - The Time is Now

    An evolving technology landscape can already make a well planned cloud migration strategy seem like a complex task, but as we’ve learned in the past few months, there are often additional challenges thrown into the works. This can lead to business needing to accelerate plans at a time when operational activities are already more difficult. How can you be sure you’re taking the necessary precautions pre-, during and post-migration?

    On this live webcast, Rob Harrison, chief product officer at Capsule8, and guest speaker, Andras Cser, vice president and principal analyst at Forrester Research, will discuss how security considerations for a cloud migration have changed over the past few months and how future trends change risk when adopting accelerating strategies. Rob and Andras will discuss the challenges from both a business execution level and a cybersecurity level and how to mitigate those risks. Attendees of this live webcast will learn:

    - Pre, during and post migration strategies
    - Business level vs. cyber risk
    - How different business verticals are utilizing cloud migration strategies as an opportunity for growth
    - Geographical trends and compliance considerations
Secure Production, Avoid Disruption
Capsule8 provides modern enterprises scalable Linux workload protection. The pioneer behind “ops-friendly” Linux security, Capsule8 Protect is purpose-built to deliver monitoring, detection and response with a single agent that can be deployed across heterogenous production environments. By using Capsule8, security teams have the visibility needed to detect incidents and protect against unwanted behavior, allowing them reduce downtime and avoid costly business disruption.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Considerations for Cloud Migration During a Crisis
  • Live at: Jul 28 2020 3:00 pm
  • Presented by: Rob Harrison, Chief Product Officer, Capsule8 and guest speaker, Andras Cser, VP & principal analyst at Forrester Research
  • From:
Your email has been sent.
or close