Agenda | June 14, 2022 | 2:00 - 4:00 PM EDT
Schedule | Description |
---|---|
2:00 PM | Welcome & Opening RemarksJake Williams, SANS Instructor & Subject Matter Expert |
2:05 PM | Detecting suspicious Activity on AWS Using Cloud LogsCloud security monitoring is critical to identifying risky behavior within your cloud environment. AWS CloudTrail systematically records actions within your cloud environment to help you keep track. If someone creates a user, changes permissions, or provisions a new service, it is captured in these cloud logs. As your use of cloud services grows, how can you continuously monitor cloud activity and understand risk? In this lightning talk, we will discuss:
Mike Isbitski, Director of Cybersecurity Strategy, Sysdig |
2:20 PM | DEMO: Cloud Detection and Response with Sysdig SecureIn this five minute demo, we will demonstrate how to detect and respond to threats across multi-cloud using cloud audit logs. Pawan Shankar, Sr. Director of Product Marketing, Sysdig |
2:25 PM | Enabling Security Teams to Protect Containers and KubernetesSecurity teams need to be adapt as their organizations shift application development to containers and Kubernetes. Traditional tools can't handle the dynamic nature of the cloud, leaving teams blind to risk. In this session, Accenture and Sysdig will discuss how to solve the biggest security challenges of running cloud-native workloads. We will discuss:
Anna Belak, Director of Thought Leadership, Sysdig |
2:40 PM | DEMO: Container Detection and Response with Sysdig SecureWe will demonstrate how to detect and respond to runtime threats across containers and Kubernetes in 5 minutes. Pawan Shankar, Sr. Director of Product Marketing, Sysdig |
2:45 PM | Prioritize Vulnerabilities Using Runtime IntelligenceDid you know that up to 95% of vulnerabilities alerts are just noise? Developers are scrolling through thousands of vulnerability spreadsheets to prioritize what matters. The key is to focus on the ones actually exposed at runtime. Join this lightning talk to learn:
Eric Carter, Director of Product Marketing, Sysdig |
3:00 PM | DEMO: Prioritized vulnerability management with Sysdig and Snyk
In this five minute demo, see how Sysdig and Snyk automatically prioritize vulnerabilities and reduce noise by up to 95%. |
3:10 PM | Fireside Chat: Securing the DevSecOps Pipeline with Shift Left + Runtime SecurityAn effective security strategy requires a secure DevOps solution that can bridge the gap between security practitioners’ context in runtime, and an engineering team’s code in development. Developers and security teams need tools to help them easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime. This secures apps as they are built and protects workloads in runtime. In this session, experts from Expel, Snyk and Sysdig will discuss how to:
Knox Anderson, Vice President of Product Management, Sysdig |
3:55 PM | Closing RemarksJake Williams, SANS Instructor & Subject Matter Expert |