SlideShare a Scribd company logo
@teriradichel
How the Cloud
Changes Cyber Security
Teri Radichel, CEO | 2nd Sight Lab
@teriradichel
@teriradichel
Enterprises are predicted to invest over 3.5
million on average within the next year on
cloud technologies. This expenditure will take
30% of their total IT budget in 2020.
- IDG
@teriradichel
94% of respondents to the 2019 RightScale
State of the Cloud Report use cloud.
- RightScale
@teriradichel
The same concerns
@teriradichel
Responsibility
CUSTOMER CUSTOMER CUSTOMER
CLOUD PROVIDER
CLOUD PROVIDER
CLOUD PROVIDER
@teriradichel
Contracts + Legal
CUSTOMER
CLOUD PROVIDER
@teriradichel
Procurement
EXPENSE
REPORT
………..
$……….
Amazon Web Services
$…….
_________________
$…….
INVOICE
_________________
Dropbox
…. ….
………………….
………………….
$ …….
P.O.
………..
……..
Salesforce
………..
………………
$ …….
@teriradichel
Assessing the cloud provider (CSA CAIQ)
@teriradichel
Cloud provider risks
@teriradichel
Cloud provider best practices
@teriradichel
Individual service configurations
@teriradichel
Misconfigurations
@teriradichel
DevOps
@teriradichel
Automated governance
@teriradichel
Stolen credentials
@teriradichel
SSO
@teriradichel
MFA
?
@teriradichel
Networking
@teriradichel
Data exfiltration
@teriradichel
CASBs
CLOUD 1
CLOUD 2 ⚠️
CLOUD 3
CLOUD 4
CLOUD 5
@teriradichel
Encryption
?
@teriradichel
Compute
@teriradichel
Architecture
APPWEB DATA
@teriradichel
Segregation
QADEV PROD
@teriradichel
Least privilege
z
@teriradichel
Logs
@teriradichel
84% of surveyed enterprises describe
their IT infrastructure as “multi-cloud.”
- RightScale 2019 State of the Cloud Report
@teriradichel
Multi-cloud
X 3+
@teriradichel
Checklist
Legal
Procurement
CSP assessments (CAIQ)
CSP best practices
CSP service configurations
Training
Automate governance
Credentials – SSO + MFA
Networking
Cloud encryption
New compute
CASBs + DLP
Architecture
Segregation
Least privilege
Monitor all the logs
@teriradichel
Thank you!
Teri Radichel
Follow: @teriradichel + @2ndsightlab
Web: https://2ndsightlab.com
Blog: https://medium.com/cloud-security
Classes: https://2ndsightlab.com/cloud-security-training.html

More Related Content

What's hot

How to Build a Winning Data Culture
How to Build a Winning Data CultureHow to Build a Winning Data Culture
How to Build a Winning Data Culture
SnapLogic
 
Smac
SmacSmac
SMAC
SMACSMAC
SMAC
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Interesting facts and information about cloud computing
Interesting facts and information about cloud computingInteresting facts and information about cloud computing
Interesting facts and information about cloud computing
Daivik Narayan
 
Micorsoft CityNext Partner of the Year - Artis Group
Micorsoft CityNext Partner of the Year - Artis GroupMicorsoft CityNext Partner of the Year - Artis Group
Micorsoft CityNext Partner of the Year - Artis GroupNeil Gunning
 
IDC 2013 Predictions: Mobile and Cloud Dominate IT Industry
IDC 2013 Predictions: Mobile and Cloud Dominate IT IndustryIDC 2013 Predictions: Mobile and Cloud Dominate IT Industry
IDC 2013 Predictions: Mobile and Cloud Dominate IT IndustryKnowledge Hub from IDG
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Technology Trends of 2019
Technology Trends of 2019Technology Trends of 2019
Technology Trends of 2019
Artyom Leydiker
 
5g Opportunities
5g Opportunities5g Opportunities
5g Opportunities
Ramesh Kandadai
 
Sizzling Stats: Cloud Computing
Sizzling Stats: Cloud ComputingSizzling Stats: Cloud Computing
Sizzling Stats: Cloud Computing
MarketResearch.com
 
Accelerating Innovation with IBM Cloud
Accelerating Innovation with IBM CloudAccelerating Innovation with IBM Cloud
Accelerating Innovation with IBM Cloud
LaurenWendler
 
Digital Oil Field
Digital Oil FieldDigital Oil Field
Digital Oil Field
Ramesh Kandadai
 
Top 9 Use Cases for Human Resources Automation
Top 9 Use Cases for Human Resources AutomationTop 9 Use Cases for Human Resources Automation
Top 9 Use Cases for Human Resources Automation
Maruti Techlabs
 
Synthesis Labs Cloud Consulting - Michael Shapiro
Synthesis Labs Cloud Consulting - Michael ShapiroSynthesis Labs Cloud Consulting - Michael Shapiro
Synthesis Labs Cloud Consulting - Michael Shapiro
Synthesis Software
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographic
VMware Academy
 
SubCentral - Cloud Software Market Research
SubCentral - Cloud Software Market ResearchSubCentral - Cloud Software Market Research
SubCentral - Cloud Software Market Research
Jason Yablinsky
 
Account Director Public Sector Cloud Computing Sales Vacancies
Account Director Public Sector Cloud Computing Sales VacanciesAccount Director Public Sector Cloud Computing Sales Vacancies
Account Director Public Sector Cloud Computing Sales VacanciesJPE Cloud Recruiter
 
Just in Time Analytics - Where Conference
Just in Time Analytics - Where ConferenceJust in Time Analytics - Where Conference
Just in Time Analytics - Where Conferenceseagor
 

What's hot (19)

How to Build a Winning Data Culture
How to Build a Winning Data CultureHow to Build a Winning Data Culture
How to Build a Winning Data Culture
 
Smac
SmacSmac
Smac
 
SMAC
SMACSMAC
SMAC
 
SMAC
SMACSMAC
SMAC
 
Interesting facts and information about cloud computing
Interesting facts and information about cloud computingInteresting facts and information about cloud computing
Interesting facts and information about cloud computing
 
Micorsoft CityNext Partner of the Year - Artis Group
Micorsoft CityNext Partner of the Year - Artis GroupMicorsoft CityNext Partner of the Year - Artis Group
Micorsoft CityNext Partner of the Year - Artis Group
 
IDC 2013 Predictions: Mobile and Cloud Dominate IT Industry
IDC 2013 Predictions: Mobile and Cloud Dominate IT IndustryIDC 2013 Predictions: Mobile and Cloud Dominate IT Industry
IDC 2013 Predictions: Mobile and Cloud Dominate IT Industry
 
SMAC
SMACSMAC
SMAC
 
Technology Trends of 2019
Technology Trends of 2019Technology Trends of 2019
Technology Trends of 2019
 
5g Opportunities
5g Opportunities5g Opportunities
5g Opportunities
 
Sizzling Stats: Cloud Computing
Sizzling Stats: Cloud ComputingSizzling Stats: Cloud Computing
Sizzling Stats: Cloud Computing
 
Accelerating Innovation with IBM Cloud
Accelerating Innovation with IBM CloudAccelerating Innovation with IBM Cloud
Accelerating Innovation with IBM Cloud
 
Digital Oil Field
Digital Oil FieldDigital Oil Field
Digital Oil Field
 
Top 9 Use Cases for Human Resources Automation
Top 9 Use Cases for Human Resources AutomationTop 9 Use Cases for Human Resources Automation
Top 9 Use Cases for Human Resources Automation
 
Synthesis Labs Cloud Consulting - Michael Shapiro
Synthesis Labs Cloud Consulting - Michael ShapiroSynthesis Labs Cloud Consulting - Michael Shapiro
Synthesis Labs Cloud Consulting - Michael Shapiro
 
Vmw top5-reasons-infographic
Vmw top5-reasons-infographicVmw top5-reasons-infographic
Vmw top5-reasons-infographic
 
SubCentral - Cloud Software Market Research
SubCentral - Cloud Software Market ResearchSubCentral - Cloud Software Market Research
SubCentral - Cloud Software Market Research
 
Account Director Public Sector Cloud Computing Sales Vacancies
Account Director Public Sector Cloud Computing Sales VacanciesAccount Director Public Sector Cloud Computing Sales Vacancies
Account Director Public Sector Cloud Computing Sales Vacancies
 
Just in Time Analytics - Where Conference
Just in Time Analytics - Where ConferenceJust in Time Analytics - Where Conference
Just in Time Analytics - Where Conference
 

Similar to How the Cloud Changes Cyber Security

How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadArup Das
 
Trends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
Trends 2020 - Demystifying Bleeding Edge from Leading Edge TechnologyTrends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
Trends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
Fulcrum Digital
 
Next-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial ServicesNext-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial Services
Bernard Marr
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
DivvyCloud
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
GovCloud Network
 
Hybrid Integration: Need, Strategies and Scenarios
Hybrid Integration: Need, Strategies and ScenariosHybrid Integration: Need, Strategies and Scenarios
Hybrid Integration: Need, Strategies and Scenarios
muralipol
 
11 Cloud statistics you must know in 2020
11 Cloud statistics you must know in 202011 Cloud statistics you must know in 2020
11 Cloud statistics you must know in 2020
Ramesh M
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
IMC Institute
 
Cts Corporate Pitch
Cts Corporate PitchCts Corporate Pitch
Cts Corporate PitchSteve Kaye
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
Michael Skok
 
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
Cloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same CoinCloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same Coin
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
IMC Institute
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
VARINDIA
 
Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010
rkasai
 
Internet of Things - Enablement by Techcello
Internet of Things - Enablement by TechcelloInternet of Things - Enablement by Techcello
Internet of Things - Enablement by Techcello
Ilyas F ☁☁☁
 
An Insider's View on What It Takes to Be Digital Ready
An Insider's View on What It Takes to Be Digital ReadyAn Insider's View on What It Takes to Be Digital Ready
An Insider's View on What It Takes to Be Digital Ready
Equinix
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
Dean Bonehill ♠Technology for Business♠
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
Avni Rajput
 
Schoology cloud assignment
Schoology cloud assignmentSchoology cloud assignment
Schoology cloud assignment
Vellore Institute of Technology
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
OpsRamp
 

Similar to How the Cloud Changes Cyber Security (20)

How CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLeadHow CIOs should make Cloud investment - InfotechLead
How CIOs should make Cloud investment - InfotechLead
 
Trends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
Trends 2020 - Demystifying Bleeding Edge from Leading Edge TechnologyTrends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
Trends 2020 - Demystifying Bleeding Edge from Leading Edge Technology
 
Next-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial ServicesNext-Generation Cloud Infrastructure for Financial Services
Next-Generation Cloud Infrastructure for Financial Services
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
 
Hybrid Integration: Need, Strategies and Scenarios
Hybrid Integration: Need, Strategies and ScenariosHybrid Integration: Need, Strategies and Scenarios
Hybrid Integration: Need, Strategies and Scenarios
 
11 Cloud statistics you must know in 2020
11 Cloud statistics you must know in 202011 Cloud statistics you must know in 2020
11 Cloud statistics you must know in 2020
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
 
Cts Corporate Pitch
Cts Corporate PitchCts Corporate Pitch
Cts Corporate Pitch
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
Cloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same CoinCloud Computing  "Risk Driver vs Value Driver"  Two Sides of the Same Coin
Cloud Computing "Risk Driver vs Value Driver" Two Sides of the Same Coin
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010Opportunities in Cloud Computing Q3 2010
Opportunities in Cloud Computing Q3 2010
 
Internet of Things - Enablement by Techcello
Internet of Things - Enablement by TechcelloInternet of Things - Enablement by Techcello
Internet of Things - Enablement by Techcello
 
An Insider's View on What It Takes to Be Digital Ready
An Insider's View on What It Takes to Be Digital ReadyAn Insider's View on What It Takes to Be Digital Ready
An Insider's View on What It Takes to Be Digital Ready
 
IDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary CloudIDC FutureScape Exec Summary Cloud
IDC FutureScape Exec Summary Cloud
 
Not Using Cloud? 5 Stats Show You're Already Behind
Not Using Cloud?  5 Stats Show You're Already BehindNot Using Cloud?  5 Stats Show You're Already Behind
Not Using Cloud? 5 Stats Show You're Already Behind
 
Schoology cloud assignment
Schoology cloud assignmentSchoology cloud assignment
Schoology cloud assignment
 
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
[Report] Five Trends Reveal The Emergence of Cloud-First Enterprises
 

More from Teri Radichel

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
Teri Radichel
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Teri Radichel
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
Teri Radichel
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
Teri Radichel
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
Teri Radichel
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
Teri Radichel
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
Teri Radichel
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
Teri Radichel
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Teri Radichel
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
Teri Radichel
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
Teri Radichel
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
Teri Radichel
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your Cloud
Teri Radichel
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
Teri Radichel
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
Teri Radichel
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
Teri Radichel
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
Teri Radichel
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
Teri Radichel
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
Teri Radichel
 

More from Teri Radichel (20)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your Cloud
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

How the Cloud Changes Cyber Security