ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Cloud Security Orienteering - Rami McCarthy (DEF CON 29 - Cloud Village)

Автор: Cloud Village

Загружено: 2021-08-30

Просмотров: 202

Описание: Speaker: Rami McCarthy is a Staff Security Engineer at Cedar (a healthtech unicorn), and a recovering Security Consultant. He spent 3 years at NCC Group where he executed dozens of security assessments and sat on the Cloud Security working group. He was a core contributor to ScoutSuite - a multi-cloud auditing tool (and SaaS offering), and released sadcloud - a tool for Terraforming insecure AWS environments. Rami holds the CCSK, the AWS Certified Security – Specialty, and is completing an MS in information security leadership.

Twitter:   / ramimacisabird  

Abstract: Most of us are not lucky enough to have architected the perfect cloud environment, according to this month's best practices, and without any legacy elements or ""surprise"" assets. Over the course of a career in cloud security, you'll likely find yourself walking into a new environment and needing to rapidly orient yourself to both mitigate the biggest risks and also develop a roadmap towards a sustainable, secure future. As a security consultant, I had the challenge and opportunity to enter blind into a variety of cloud environments. They were across Azure, GCP, and AWS, some well-architected and others organically sprawling, containing a single account/project and hundreds. This gave me a rapid education in how to find the information necessary to familiarize myself with the environment, dig in to identify the risks that matter, and put together remediation plans that address short, medium, and long term goals. This talk will present a cloud and environment agnostic methodology for getting your bearings if tasked with securing a novel cloud environment. We'll learn by applying this to a sample AWS environment in order to cover:
An archeological guide for where and how to find organizational context
How to quickly find and kill the most common attack vectors at the perimeter (both network and identity)
Common architectural and deployment patterns, how to spot them, and their security implications
What you need to know, what you need to prioritize, and what best practices" aren't worth the squeeze when you're in a crunch.


--

Cloud village is an open space to meet folks interested in offensive and defensive aspects of cloud security. The village is home to various activities like talks, workshops, CTFs and discussions targeted around cloud services.

If you are a professional who is looking to gain knowledge on securely maintaining the cloud stack and loves to be around like-minded security folks who share the similar zeal towards the community, Cloud Village is the perfect place for you.

Website: https://cloud-village.org/
Twitter:   / cloudvillage_dc  

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Cloud Security Orienteering - Rami McCarthy (DEF CON 29 - Cloud Village)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo

Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo

Live Webinar- Securing Multi-AI Deployments MCP; Agentic AI & Inter-AI Security

Live Webinar- Securing Multi-AI Deployments MCP; Agentic AI & Inter-AI Security

Атака дронами по США / Удар по небоскрёбам

Атака дронами по США / Удар по небоскрёбам

Рабочая музыка для глубокой концентрации и сверхэффективности

Рабочая музыка для глубокой концентрации и сверхэффективности

30-Day Manager Experiments to Boost Team Engagement. The Engagement Lab 2.

30-Day Manager Experiments to Boost Team Engagement. The Engagement Lab 2.

Weaponizing SageMaker AI: Real-World Offense in Machine Learning Platforms - Shani Peled

Weaponizing SageMaker AI: Real-World Offense in Machine Learning Platforms - Shani Peled

Construct Details, Measurement and Scale Validity of the Intrivity Predecessor, icEdge

Construct Details, Measurement and Scale Validity of the Intrivity Predecessor, icEdge

Politics Chat, March 12, 2026

Politics Chat, March 12, 2026

Mastering Funding and Program Design

Mastering Funding and Program Design

Closing Note - Jayesh Singh Chauhan (DEF CON 29 - Cloud Village)

Closing Note - Jayesh Singh Chauhan (DEF CON 29 - Cloud Village)

Scams and Fraud

Scams and Fraud

Kubernetes Security Scanner - Krishna Priya

Kubernetes Security Scanner - Krishna Priya

American Conversations: Education Policy with Josh Cowen

American Conversations: Education Policy with Josh Cowen

Where Precision Meets Partnership in Building Audit-ready Calibration Programs

Where Precision Meets Partnership in Building Audit-ready Calibration Programs

Bridging Care: Understanding the CHW Standing Recommendation and Referral Process

Bridging Care: Understanding the CHW Standing Recommendation and Referral Process

Али Хуссейн, Tabs | theCUBE + NYSE Wired: Mixture of Experts AI AGENT Conference 2026

Али Хуссейн, Tabs | theCUBE + NYSE Wired: Mixture of Experts AI AGENT Conference 2026

AI & Agents in 2026 with Dr. Andrew Schwarz

AI & Agents in 2026 with Dr. Andrew Schwarz

[DIRECT] Webinaire

[DIRECT] Webinaire

Музыка для Фокуса • Гиперфокус без отвлечений для Deep Work, учёбы и максимальной продуктивности

Музыка для Фокуса • Гиперфокус без отвлечений для Deep Work, учёбы и максимальной продуктивности

Prowler - Maximize your Cloud Security Compliance Assessments with Open Source and a pinch of AI

Prowler - Maximize your Cloud Security Compliance Assessments with Open Source and a pinch of AI

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]