Threat Correlation from Laptop to Cloud

Logo
Presented by

Crystal Poenisch, Senior PMM for Cloud Security, Uptycs and Andre Rall, Director of Cloud Security, Uptycs

About this talk

The golden thread ties rich security data across your developer laptops, source code repositories, identity providers, and into your cloud infrastructure - all within a single platform and data model. This correlation across attack surfaces serves as an early warning system to protect your environment before it’s too late. When a threat actor compromises a laptop or source code repository as an entry point, reducing time to detection is vital to carving out malicious files and blocking further lateral movement. With Uptycs support for SaaS (Github) and identity (Okta) providers, coverage is extended across the entire development lifecycle to provide end to end detection from laptop to cloud. Join Crystal Poenisch, Senior PMM for Cloud Security, and Andre Rall, Director of Cloud Security, to learn how to weave the golden thread throughout your environment and identify malicious activity early. Together, we’ll walk through a golden thread that correlates a hacker's activity from a developer's laptop as they enumerate credentials and continue hunting for crown jewels through Github, Okta, and eventually AWS.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (37)
Subscribers (907)
Secure cloud, containers, and endpoints with one unified solution. Find and remove critical risks in your modern attack surface—from laptops to containers—all from a single UI and data model.