Skip to content

Responding To Threats In AWS Linux & Kubernetes Environments (free webinar)

Photo of Karen
Hosted By
Karen
Responding To Threats In AWS Linux & Kubernetes Environments (free webinar)

Details

The cloud is complex. Data can be extremely difficult to access, or worse, disappear in the blink of an eye. While the ephemeral nature of cloud environments often makes an investigation seem like an impossible task, automation flips the script. By automating the most tedious parts of an in-depth investigation, including data capture and processing, analysts can get to the bottom of what happened without delays or headaches. Join us to discuss real-life attack techniques used to compromise AWS Linux and Kubernetes environments and how to gain the level of visibility and depth that’s required to respond to cloud incidents most efficiently.

In this webinar we’ll discuss:

  • TTPs used to compromise AWS Linux and Kubernetes environments
  • How automation can transform cloud investigation and response
  • The most valuable data sources when performing a thorough cloud investigation
  • Tips and recommendations for investigating and responding to potential compromise

Speakers
Allan Carchrie – Solutions Engineer, Cado Security
Allan has years of experience helping organizations fight sophisticated cyber espionage and criminal campaigns. Prior to joining Cado Security, Al worked at PwC as Cyber Threat Detection and Response Analyst. Prior to that, he worked at the Royal Air Force as Cyberspace Communications Specialist.
Matt Muir, Threat Researcher, Cado Security
Matt is a security researcher with a passion for UNIX and UNIX-like operating systems. He previously worked as a macOS malware analyst and his background includes experience in the areas of digital forensics, DevOps, and operational cyber security. Matt enjoys technical writing and has published research including pieces on TOR browser forensics, an emerging cloud-focused botnet, and the exploitation of the Log4Shell vulnerability.

Registration
https://www.linuxfoundation.org/webinars/responding-to-threats-in-aws-linux-kubernetes-environments/

Sponsored by Cado Security
_________________
During the event, feel free to join our group's chat spaces to discuss the matters with our community members and organizers:

Discord: http://cloudstudy.net/discord
Telegram (group): https://t.me/CloudStudyNet
Slack: http://cloudstudy.net/slack

You can also find and follow us on Social Media 👍:
Twitter: https://twitter.com/CloudStudyNet
YouTube: http://bit.ly/CloudStudyNetYT
Twitch: https://www.twitch.tv/cloudstudynetwork
Telegram (channel): https://t.me/CloudStudyNetwork
Clubhouse: https://www.clubhouse.com/club/cloud-study-network
Instagram: https://www.instagram.com/cloudstudynetwork/
Reddit: https://www.reddit.com/r/CloudStudyNetwork/
Facebook: https://www.facebook.com/CloudStudyNetwork/
Facebook (group): https://www.facebook.com/groups/cloudstudynetwork
LinkedIn: https://www.linkedin.com/company/cloud-study-network/
LinkedIn (group): https://www.linkedin.com/groups/9061836/
SlideShare: https://www.slideshare.net/CloudStudyNetwork

You might also be interested to subscribe to our newsletter with lots of freebies, amazing cloud related deals and event announcements: http://bit.ly/CloudStudyNetNews

Photo of Cloud Study Network group
Cloud Study Network
See more events