Behaviors of Compromised Cloud Environments

Logo
Presented by

Ulfar Erlingsson - Chief Architect, Lacework | Michael Bentley - Sr. Product Manager, Lacework

About this talk

Infrastructure as a Service (IaaS) empowers [or propels] engineering teams to move faster by abstracting low-level details into high-level APIs. To maximize efficiency, teams often go all in on IaaS for computing, databases, and storage. But those efficiency gains may help attackers storm your cloud environments post-compromise. Join Lacework Chief Architect Ulfar Erlingsson and Michael Bentley, Sr. Product Manager as they cover: * Detecting compromise entry points * Defeating attacker strategies, mapped to Mitre ATT&CK * Differentiating automation, misconfigurations, and compromises
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (46)
Subscribers (2190)
Lacework is the security company for the cloud. The Lacework Cloud Security Platform is offered as-a-Service and delivers build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across AWS, GCP, Azure, and Kubernetes services, workloads, and containers. Trusted by enterprise customers worldwide, Lacework significantly drives down costs and risk, and removes the burden of unnecessary toil, rule writing, and inaccurate alerts.