InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat Correlation from Laptop to Cloud

Presented by

Crystal Poenisch, Senior PMM for Cloud Security, Uptycs and Andre Rall, Director of Cloud Security, Uptycs

About this talk

The golden thread ties rich security data across your developer laptops, source code repositories, identity providers, and into your cloud infrastructure - all within a single platform and data model. This correlation across attack surfaces serves as an early warning system to protect your environment before it’s too late. When a threat actor compromises a laptop or source code repository as an entry point, reducing time to detection is vital to carving out malicious files and blocking further lateral movement. With Uptycs support for SaaS (Github) and identity (Okta) providers, coverage is extended across the entire development lifecycle to provide end to end detection from laptop to cloud. Join Crystal Poenisch, Senior PMM for Cloud Security, and Andre Rall, Director of Cloud Security, to learn how to weave the golden thread throughout your environment and identify malicious activity early. Together, we’ll walk through a golden thread that correlates a hacker's activity from a developer's laptop as they enumerate credentials and continue hunting for crown jewels through Github, Okta, and eventually AWS.
Uptycs

Uptycs

943 subscribers37 talks
Learn how to shift up your cybersecurity.
Secure cloud, containers, and endpoints with one unified solution. Find and remove critical risks in your modern attack surface—from laptops to containers—all from a single UI and data model.
Related topics