Webinars

Insights from the best projects and people

All Webinars

Responding to Threats in AWS Linux & Kubernetes Environments

Date: Mar 16, 20229:00AM PDT (UTC-7) Cloud

Join Us for a Complimentary Live Webinar
Sponsored by Cado Security

The cloud is complex. Data can be extremely difficult to access, or worse, disappear in the blink of an eye. While the ephemeral nature of cloud environments often makes an investigation seem like an impossible task, automation flips the script. By automating the most tedious parts of an in-depth investigation, including data capture and processing, analysts can get to the bottom of what happened without delays or headaches. Join us to discuss real-life attack techniques used to compromise AWS Linux and Kubernetes environments and how to gain the level of visibility and depth that’s required to respond to cloud incidents most efficiently.

In this webinar we’ll discuss:

  • TTPs used to compromise AWS Linux and Kubernetes environments
  • How automation can transform cloud investigation and response
  • The most valuable data sources when performing a thorough cloud investigation
  • Tips and recommendations for investigating and responding to potential compromise

Speakers

Allan Carchrie – Solutions Engineer, Cado Security
Allan has years of experience helping organizations fight sophisticated cyber espionage and criminal campaigns. Prior to joining Cado Security, Al worked at PwC as Cyber Threat Detection and Response Analyst. Prior to that, he worked at the Royal Air Force as Cyberspace Communications Specialist. 

 

Matt Muir, Threat Researcher, Cado Security
Matt is a security researcher with a passion for UNIX and UNIX-like operating systems. He previously worked as a macOS malware analyst and his background includes experience in the areas of digital forensics, DevOps, and operational cyber security. Matt enjoys technical writing and has published research including pieces on TOR browser forensics, an emerging cloud-focused botnet, and the exploitation of the Log4Shell vulnerability.

 

Sponsored by