Threat Hunting in a Borderless World

Logo
Presented by

Eric Lorson, Senior Security Engineer, Sumo Logic

About this talk

With organizations moving infrastructure to the cloud at a record pace, building a perimeter wall around your organization is no longer a viable option for securing your data. Cloud computing completely changes the attack surface available to be exploited and can create potential security vulnerabilities for those unaware of what to look for. Fortunately, the data provided by cloud providers can be your best tool for identifying and mitigating threats. We will take a look at how threat hunting changes in the cloud.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (784)
Subscribers (198280)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.