Cloud security: Does the endpoint still matter?

Logo
Presented by

Anton Ovrutsky, Senior Threat Researcher (Sumo Logic) & Megan Roddie, Senior Security Engineer (IBM)

About this talk

Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically? There are many pathways that threat actors utilize to gain access to cloud resources. Among these are endpoints that contain various cloud credential material. This cloud credential material - in the form of various files, tokens and cookies is often overlooked, with little visibility and telemetry generated.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (34)
Subscribers (2744)
Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™. Practitioners and developers around the world rely on Sumo Logic to gain real-time analytics and insights from their cloud-native applications, helping them ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures.