CloudSecuritySummit&Training 2019 April 29, 2019 to May 6, 2019, San Jose, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cloud Security at its Finest Ben Hagen This talk will explore the best and sparkliest cloud security has to offer; focusing on ...
Secrets for All the Things: The Injection of Secrets for Every Application in Your Cloud-Agnostic Environment Brian Ruth In this presentation we'll discuss why a centralized location for the management of secrets is ...
Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff Lily Lee It's a new world—a cloud world. Everyone is moving to AWS because of its ease ...
Automating Cloud Security Monitoring at Scale Chris Farris The big three cloud providers innovate at a pace that security teams have a hard ...
Who Done It? Gaining Visibility and Accountability in the Cloud Marta Nolette Every day more enterprises are incorporating cloud services and workflows. Moving data to the public ...
Automating the Creation of Network Firewall Rules Using PowerShell and CI/CD Nilss Franssens Managing firewall rules is a complex task. During this talk, we'll discuss one way to ...
Locking Them out of Their Own House: Access Control to Cloud at Startups Jackie Bow As a security engineer, when you join a startup or smaller company, it’s likely there ...
Cloud Security as Culture N/a This panel will focus on the wins and failures experienced by panel participants in promoting ...
The State of Cloud Security: How Does Your Organization Compare? Dave Shackleford Be the first to hear highlights from the SANS 2019 Cloud Security Survey, conducted in ...
Serverless Security: Attackers and Defenders Ory Segal In serverless applications, the cloud provider is responsible for securing the underlying infrastructure, from the ...
Secure by Default - Enabling developers to focus on their mission by providing cloud security for free Reeza Pritchard Riot Games aims to deliver security for free to our developers to enable them to ...
Demonstration of Typical Forensic Techniques for AWS EC2 Instances Kenneth G. Hartman This demo is a step-by-step walk-through of techniques that can be used to perform forensics ...
Cloud DFIR: Why so Cirrus? Rick Correa As companies move to cloud-based methods of collaboration, the days of looking thru MFT files ...
Securing your Application Identities Tarek Pavlovsky As organizations are modernizing their applications and moving them to the cloud, the challenge of ...
Cloud Security Automation: From Infrastructure to App Frank Kim Learn how to leverage security automation in your cloud infrastructure, DevOps pipeline, and applications. Using ...