Traditional DFIR Methods = Not Fit For Cloud

Presented by

Dave Gruber, Doug Cahill, James Campbell

About this talk

Dissecting Cado Security and ESG's 2021 Cloud Digital Forensics Market Research Although organizations recognize the need for cloud-specific DFIR controls, a majority of security teams are — unsurprising — leaning on the traditional tools and processes they're familiar with. However, as cloud threats continue to grow in number and sophistication, it’s becoming increasingly clear that legacy DFIR methods and tools were not developed for cloud-based incidents. It takes too long, or often feels impossible, to get the data needed for a cloud investigation. Join ESG experts Dave Gruber and Doug Cahill alongside Cado Security's CEO and co-founder & life-long DFIR-er James Campbell, as they dig into new cloud DFIR research findings and discuss best practices for implementing a cloud DFIR strategy. In this webinar, you’ll learn: - Current digital forensics strategies for cloud workload investigations - How to overcome security obstacles associated with the use of containers and auto-scaling infrastructure - How to drastically reduce time to evidence - going from days to minutes, leveraging cloud processing & automation techniques - How to gain critical visibility across high-availability production systems, where an agent-based collection agent can't be deployed
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (591)
Cado Security provides the first and only cloud-native digital forensics platform. Built in the cloud, for the cloud, the Cado Response platform automates data capture and processing to empower security professionals to reduce risk and respond to data breaches faster. Cado Response is the only platform that provides forensic capture of short-term data environments such as cloud-native architectures, containers and auto-scaling infrastructures. With Cado Response, enterprises gain visibility across cloud environments, enabling them to quickly and precisely understand the impact of compromises and respond to cyber incidents at cloud speed.