Skip to content

Details

AGENDA

6:00 - 6:30pm: Introduction

6:30 - 8:00pm: Abhinav Singh - Defender’s Guide to Securing Data in AWS

Summary of the talk:
Data in the cloud is expanding at an exponential rate and securing it involves building defense guardrails at multiple levels. This hands-on presentation covers use cases for implementing a strong data security posture for your public cloud infrastructure. It includes data classification, access and monitoring controls with in-depth modules on implementing them on AWS.

This presentation focuses on building up a data security practice in public cloud infrastructure like AWS. It will begin by showcasing the various ways in which data can exist in cloud infrastructures; primarily as structured or unstructured datastores. The hands-on modules will be divided to cover three important use-cases about both types of data.
The first use-case includes building up a data classification system to understand the nature of data, its relevance and other regulatory needs depending on the nature of the business.
The second use-case will dive into database access both at IAM as well as database user level. The lab will showcase advanced use-cases of implementing user access controls not only at instance level but also at table and column level.
The third use-case will focus on building monitoring controls around data governance and access to identify potential anomalies, abuse of permissions and data-ransom related attacks.

The final takeaway will be to combine the three use-cases into a single data security posture management program, built by using native cloud services. Attendees will be provided with a complete PDF guide consisting of step-by-step guidance on all the discussed modules, a runbook with a one week, 4 week and 6-month timeline on implementing the data security program at a wider level in their organization.

Speaker bio:
Abhinav Singh is a cybersecurity researcher with a decade-long experience working for global leaders in security technology, financial institutions and as an independent trainer/consultant. He is the author of Metasploit Penetration Testing Cookbook (first, second & third editions) and Instant Wireshark Starter, by Packt. He is an active contributor to the security community in the form of patents, open-source tools, paper publications, articles, and blogs. His work has been quoted in several security and privacy magazines, and digital portals. He is a frequent speaker and trainer at eminent international conferences like Black Hat, RSA, Defcon, Troopers, HITB etc. His areas of expertise include malware research, reverse engineering, enterprise security, forensics, and cloud security.

Related topics

Events in Sunnyvale, CA
Cloud Security
Data Security
Amazon Web Services
Information Security

You may also like