Tags:
On September 30 - October 1, attendees in Denver, CO and thousands from around the globe tuned in for the SANS CloudSecNext Summit. Top practitioners and global experts shared actionable ideas, methods, and techniques to overcome obstacles, and connect with leading professionals.
We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the talks through a visual lens, take a look at the recordings below.
*If you registered for the Summit, video recordings will be available on your Summit Access page in your SANS Portal next week!
Keynote: Security Journey at Elastic
Mandy Andress, CISO, Elastic
When Cloud Encryption Matters: From Another Layer of Access Control to a False Sense of Security
Jason Kao, Founder, Fog Security
From AFT to ATO, AWS native FedRAMP through Terraform
Michael Greenlaw, Co-Founder & Principal Consultant, HanaByte
Unpacking the Psycho-Cyber Kill Chain
John Walker, Director of Security Research, BeyondTrust
Adding functionality to the AzureRM Provider for SecOps
Kyler Middleton, Cloud Security Chick, Veradigm
Best Practices for How to Manage All Your Access from the Cloud: The Next Frontier in Your Security Journey
Bailey Bercik, Senior Product Manager, MicrosoftJef Kazimer, Principal Product Manager , Microsoft

Connecting the Broken Links - Exploring Identity Integrations between the Three CSPs and their Managed Kubernetes Offerings
Dakota Riley, Staff Security Engineer, LiveRamp
The Yin and Yang of Generative AI in Cybersecurity: Opportunities and Challenges
Vaibhav (VB) Malik, Global Partner Solutions Architect, CloudFlare
Keynote Panel
Kevin Tyers, Certified Instructor, SANS InstituteFrank Kim, Fellow, SANS Institute
Casey Essary, Deputy CISO, BILL
Eric Johnson, Senior Instructor, SANS Institute

Thinking Inside the Box: Effective DevSecOps for Containers
Christopher Pope, DevSecOps Manager, ExxonMobil
Cloudy with a Chance of Meatballs: Handling the Unexpected in Cloud Threat Detection
Lydia Graslie, Threat Detection Engineer, Edward Jones
Provable Security: Building Automated Validation of Your Cloud Security Controls
David Levitsky, Principal Infrastructure Security Engineer, RobloxGeorgios Kapoglis, Senior Detection and Response Engineer, Roblox

A needle in a haystack: How to find a threat hidden in over 6 billion logs per day
Brian Davis, Principal Software Engineer, Red Canary
Identity Crisis: Tracking Adversaries in AWS
Ryan Thompson, Certified Instructor, SANS