![]() ![]() SpecterOps – Adversary Tactics: Detection The recent CapitalOne incident revealed part of the problems need to be addressed and highlighted the importance of properly configured security controls and managing the gaps in deployed controls. Key takeaways were that cloud security needs its own focused effort heavily based on proper configuration and effective log monitoring. Identity management, logging, monitoring and alert and response activities were extensively analyzed with several tools and solutions. ![]() Basic and advanced cloud security principles were analyzed and applied in practice. It was a demanding high-pace hands-on course with practical examples and real world use cases. The rapidly evolving devops environment and the cloud services dependencies (IaaS, SaaS) make this course really helpful and valuable. One of the trainings attended was Advanced Cloud Security and Applied DevSecOps. We have even had the opportunity to have a few of the team on a couple courses.Īdvanced Cloud Security and Applied DevSecOps This year was no exception, there were great training courses lined up, covering, malware analysis, social engineering, secure software development, offensive and defensive techniques just to mention a few. Either way there is plenty to be had by everyone. Let us know which sessions you enjoyed – tweet at us at Black HatĮvery year infosec professionals flock to Black Hat to get their stickers and swag, but we have also heard about others going for the talks, training, product demos and networking opportunities. The team were fortunate to go to Black Hat and DEFCON this year, and we wanted to share back some of our favorite sessions with you all. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |