The Detection Series: Prevalent cloud techniques
Explore how adversaries compromise Azure and Amazon Web Services (AWS) cloud systems. Drawing on the real-world experience of cloud security experts from across the industry, we’ll construct a hypothetical narrative detailing how adversaries gain initial access to cloud systems, elevate their privilege levels, persist, and more. Throughout this webinar, you’ll learn how adversaries are attacking cloud systems, and what you can do to gain observability, broaden detection coverage, respond to threats, mitigate risks, and test your security controls. Some of the key techniques we’ll cover include: T1078.004: Cloud Accounts T1098.001: Additional Cloud Credentials T1059.009: Cloud API We’ll also examine device code phishing, how cloud-based privilege escalation is different from endpoints, and much more. For more guidance on sharpening your visibility in the cloud download our new resource: How to Increase AWS Visibility and Improve Cloud Security - https://redcanary.com/resources/guides/aws-visibility-cloud-security/?utm_source=youtube&utm_medium=social&utm_campaign=AWSVisibilityGuide Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners. Subscribe to our YouTube channel for frequently updated (though not overbearing), how-to content about Atomic Red Team, threat hunting in security operations, MDR or Managed Detection and Response, and using the MITRE ATT&CK framework.
Download
1 formatsVideo Formats
Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.