Defending Lift and Shift Cloud Applications | SANS@MIC Talk

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=ba47zIcaHig



Category:
Guide
Duration: 56:03
285 views
8


When an organization moves an application or service from one environment to another without stopping to redesign the application, this is often referred to as lift and shift. Many organizations, as an initial effort to move applications and services into the cloud, choose this strategy to make the move less painful and more familiar to their existing operating environment. This results in a mainly Infrastructure as a Service (IaaS) hosting environment. Although this is not the most efficient use of cloud, it is still a very common occurrence.

This talk will guide you through some of the nuances that cloud brings to your organization when transitioning from on-premise to an IaaS cloud environment and to better prepare you to defend these, now cloud-hosted, applications and services. Several, of which, are discussed in much greater detail in SEC488: Cloud Security Essentials.

Speaker Bio
Ryan Nicholson

As the lead cybersecurity engineer for a major DoD cloud project, Ryan Nicholson is constantly learning new and exciting methods to ensure that information systems in both an off- and on-premise environment can be adequately defended. Throughout these years, Ryan has picked up a number of industry certifications and is constantly trying to expand his technical and cybersecurity expertise. These certifications include GIAC's GSLC and GSEC, Offensive Security's OSCP, ISC2's CISSP, EC Council's CEH and CFHI, AWS' Certified Solutions Architect Associate. Ryan also maintains a website.




Other Videos By SANS Institute


2020-07-27How to work in ways that will make your boss take notice! | SANS Webcast
2020-07-23Get Involved! Use Your OSINT Powers for Good! | SANS@MIC Talk
2020-07-21smbtimeline - An automated timeline for SMB Traffic | SANS@MIC Talk
2020-07-17Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
2020-07-16What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability
2020-07-16What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350
2020-07-14Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
2020-07-09Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk
2020-07-09Welcome to SANS Community CTF - Services Challenges
2020-07-07The 14 Absolute Truths of Security | SANS@MIC Talk
2020-07-01Defending Lift and Shift Cloud Applications | SANS@MIC Talk
2020-06-30#LevelUpLabs | SANS@MIC Talk
2020-06-30Leveraging Organizational Change to Build a Strong Security Culture
2020-06-26SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
2020-06-26Threat Hunting via DNS | SANS@MIC Talk
2020-06-26No SQL Injection in MongoDB Applications | SANS@MIC Talk
2020-06-26Untapped Potential - SANS Blue Team Summit 2020
2020-06-23Using the Cloud to Provision Infrastructure with Software | SANS@MIC Talk
2020-06-22Cyber Security Career Development: Personal Branding
2020-06-19The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
2020-06-18Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
cloud