Главная
Study mode:
on
1
intro
2
preamble
3
about me
4
agenda
5
cybersecurity: low signals to noise ratio
6
pillar 01: defensive measures
7
pillar 02: cyber threat intelligence
8
pillar 03: testing & evaluation
9
why adversary emulation?
10
adversary emulation workflow
11
cloud attack emulation
12
detection engineering
13
detection development lifecycle
14
example - validating detections
15
emulating the cloud attack
16
cloudtrail record
17
undetected threats!
18
resources
19
demo
20
thank you for your attention
Description:
Explore a comprehensive conference talk on synergizing threat-informed defense in cloud-native environments. Delve into the challenges of cybersecurity's low signal-to-noise ratio and learn about three key pillars: defensive measures, cyber threat intelligence, and testing & evaluation. Discover the importance of adversary emulation, its workflow, and specific applications in cloud attack scenarios. Gain insights into detection engineering, including the development lifecycle and practical examples of validating detections. Examine real-world cases of emulating cloud attacks, analyzing CloudTrail records, and addressing undetected threats. Benefit from a live demonstration and access valuable resources to enhance your cloud-native security strategies.

Synergizing Threat-Informed Defense

Conf42
Add to list
0:00 / 0:00