Interested? We have you covered! This popular session will also be overflowed in The Session Viewing Point, West Level 2 Room 2004.
  1. West 2004 Screen 2

Cloud threat hunting is critical for proactively detecting and mitigating attacks on cloud and hybrid environments. Hackers leverage orchestration attacks, file synchronization poisoning, cross-tenant attacks, credential stuffing, and flaws in underlying architecture. Join this talk to learn effective cloud threat hunting tactics, including honeyclouds, integrated monitoring and behavioral analysis/AI.

Pre-Requisites: Understanding of common cloud architectures will be useful.

Download pdf
Participants: