Hi [[ session.user.profile.firstName ]]

Deciphering SOC 2 Compliance in Cloud-Native Environments

How did a fairly straightforward endeavor – an IT audit – become that monster under the bed?

Compliance projects all too often feel a massive box checking exercise. You may be pulling staff and co-workers into a vast abyss, mapping arcane compliance controls, deciphering audit speak, all to hopefully pass an audit and maybe shore up security. So how can you, the IT experts, quickly tease out the essence of what an auditor needs to give them confidence that you have passed an audit?

In this presentation we will use the example of a SOC 2 Type 1 audit in a cloud-native environment to demystify all of the dots, dashes and control numbers, giving you a high level roadmap of key elements required to pass your own SOC 2 audit regardless of where you are on your cloud native or compliance journey.
Recorded Aug 27 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cynthia Burke
Presentation preview: Deciphering SOC 2 Compliance in Cloud-Native Environments

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The ABCs of PMCs for Attack Detection Recorded: Sep 23 2020 48 mins
    Nick Gregory, Research Scientist, Capsule8 and Harini Kannan, Data Scientist, Capsule8
    A deep dive into novel hardware performance counters and how we use ML to sift through them.

    Hardware Performance Counters constitute a treasure trove of data, which surprisingly remains pretty much untouched by modern research, except for a few well known counters. In recent years, exploits like Spectre and Rowhammer and general techniques like Return Oriented Programming (ROP) were detected using hardware performance counters (HPCs). But to date, only relatively simple and well-understood counters have been used, representing just a tiny fraction of the information we can glean from the system.

    In this webinar, we’ll show how we used ML to find non-intuitive counters to build much more effective detection models against cache side channel attacks than ones previously tested in the industry. These new models are more accurate than prior cache-miss based models, and harder for attackers to bypass. We’ll also discuss the undocumented performance counters that we found as part of our Blackhat 2020 research, and the various attacks that models built with them could detect.
  • Deciphering SOC 2 Compliance in Cloud-Native Environments Recorded: Aug 27 2020 47 mins
    Cynthia Burke
    How did a fairly straightforward endeavor – an IT audit – become that monster under the bed?

    Compliance projects all too often feel a massive box checking exercise. You may be pulling staff and co-workers into a vast abyss, mapping arcane compliance controls, deciphering audit speak, all to hopefully pass an audit and maybe shore up security. So how can you, the IT experts, quickly tease out the essence of what an auditor needs to give them confidence that you have passed an audit?

    In this presentation we will use the example of a SOC 2 Type 1 audit in a cloud-native environment to demystify all of the dots, dashes and control numbers, giving you a high level roadmap of key elements required to pass your own SOC 2 audit regardless of where you are on your cloud native or compliance journey.
  • Security Considerations for Cloud Migration During a Crisis Recorded: Jul 28 2020 52 mins
    Rob Harrison, Chief Product Officer, Capsule8 and guest speaker, Andras Cser, VP & principal analyst at Forrester Research
    Accelerating Cloud Adoption - The Time is Now

    An evolving technology landscape can already make a well planned cloud migration strategy seem like a complex task, but as we’ve learned in the past few months, there are often additional challenges thrown into the works. This can lead to business needing to accelerate plans at a time when operational activities are already more difficult. How can you be sure you’re taking the necessary precautions pre-, during and post-migration?

    On this live webcast, Rob Harrison, chief product officer at Capsule8, and guest speaker, Andras Cser, vice president and principal analyst at Forrester Research, will discuss how security considerations for a cloud migration have changed over the past few months and how future trends change risk when adopting accelerating strategies. Rob and Andras will discuss the challenges from both a business execution level and a cybersecurity level and how to mitigate those risks. Attendees of this live webcast will learn:

    - Pre, during and post migration strategies
    - Business level vs. cyber risk
    - How different business verticals are utilizing cloud migration strategies as an opportunity for growth
    - Geographical trends and compliance considerations
Detection and resilience for Linux infrastructure in any environment
Capsule8 provides enterprise Linux protection that enables organizations to immediately detect unwanted activity, gain systems resilience to support operations, and uphold security across all environments at at any scale. Capsule8 offers protection across public or private cloud, containers or VMs, on-prem bare metal, and across different kernel versions and Linux distributions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Deciphering SOC 2 Compliance in Cloud-Native Environments
  • Live at: Aug 27 2020 5:00 pm
  • Presented by: Cynthia Burke
  • From:
Your email has been sent.
or close