Resources • Webinars
The Detection Series: Prevalent cloud techniques
We’re changing things up in the next installment of the Detection Series. Instead of focusing on a specific endpoint technique or tactic, we’re going to explore how adversaries compromise and navigate their way through Azure and Amazon Web Services (AWS) cloud systems.
On-demand
60 mins.
Virtual
We’re changing things up in the next installment of the Detection Series. Instead of focusing on a specific endpoint technique or tactic, we’re going to explore how adversaries compromise and navigate their way through Azure and Amazon Web Services (AWS) cloud systems.
Drawing on the real-world experience of cloud security experts from across the industry, we’ll construct a hypothetical narrative detailing how adversaries gain initial access to cloud systems, elevate their privilege levels, persist, and more. Throughout this webinar, you’ll learn how adversaries are attacking cloud systems, and what you can do to gain observability, broaden detection coverage, respond to threats, mitigate risks, and test your security controls.
Some of the key techniques we’ll cover include:
- T1078.004: Cloud Accounts
- T1098.001: Additional Cloud Credentials
- T1059.009: Cloud API
We’ll also examine device code phishing, how cloud-based privilege escalation is different from endpoints, and much more.
Join us for actionable strategies on how to harden and better defend your organization against cloud threats.