Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=VYVG0jcyK2c



Duration: 26:50
464 views
8


It's a new world—a cloud world. Everyone is moving to AWS because of its ease and scalability. However, with that flexibility comes security challenges. To actively monitor and secure their networks, AWS cloud customers need to understand what cloud services our on-premises technologies corresponded to, what data is security-relevant, where and how to get that data, and then how that data can be used to detect malicious activity. This talk will focus on great places to start collecting data and then how to make use of it.

Lily Lee, Staff Security Specialist, Splunk

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Institute


2020-02-25Rapid Recognition and Response to Rogues | SANS Security Operations Summit 2019
2020-02-18Learning from Breach Reports to Improve Cross-platform Endpoint Monitoring | SANS SOC Summit 2019
2020-02-13Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
2020-02-10Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019
2020-02-03Virtuous Cycles: Rethinking the SOC for Long-Term Success | SANS Security Operations Summit 2019
2020-01-31Build Effective Cybersecurity Team Skills | SANS Team-Based Training
2020-01-30The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
2020-01-27A SOC Technology/Tools Taxonomy – And Some Uses for It | SANS Security Operations Summit 2019
2020-01-24Who Done It? Gaining Visibility and Accountability in the Cloud | SANS Cloud Security Summit
2020-01-22SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
2020-01-17Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit
2020-01-15SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
2020-01-13Mental Models for Effective Searching | SANS Security Operations Summit 2019
2020-01-08Lessons Learned Applying ATT&CK-Based SOC Assessments | SANS Security Operations Summit 2019
2020-01-02What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781
2019-12-10Introducing Core NetWars Continuous 2
2019-11-19Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
2019-11-19Including details most readers don't need - Common Cybersecurity Writing Mistakes
2019-11-19Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
2019-11-19Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
2019-11-19Not using parallel structure - Common Cybersecurity Writing Mistakes



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
SANS Summits