InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Cloud and Kubernetes Memory Forensics

Presented by

James Campbell, CEO & Co-Founder, Cado Security & Al Carchrie, Digital Forensics Solutions Engineer, Cado Security

About this talk

Cloud breaches are hard. Time and tool limitations coupled with the complexity of the cloud often makes it impossible for security teams to determine the true root cause, scope and impact of a security incident. Further, many of today’s sophisticated hackers leverage techniques that run in memory only -- such as fileless malware, rootkits and process hollowing -- flying completely under the radar without the proper visibility. Join James Campbell and Al Carchrie, life-long digital forensics incident responders, with decades of experience fighting sophisticated state-based hackers and cybercrime groups. In this webinar you’ll learn: - How automation can transform the way memory forensics is conducted across cloud and container environments - How analyzing multiple data sources in aggregate including disk information, cloud provider logs, memory and more, can empower fully-informed decision making
Cado Security

Cado Security

633 subscribers7 talks
Cloud-Native Digital Forensics
Cado Security provides the first and only cloud-native digital forensics platform. Built in the cloud, for the cloud, the Cado Response platform automates data capture and processing to empower security professionals to reduce risk and respond to data breaches faster. Cado Response is the only platform that provides forensic capture of short-term data environments such as cloud-native architectures, containers and auto-scaling infrastructures. With Cado Response, enterprises gain visibility across cloud environments, enabling them to quickly and precisely understand the impact of compromises and respond to cyber incidents at cloud speed.
Related topics