Skip to main content

Securing Cloud-Native Architecture—A Journey through the Attacker's Lifecycle

Date

Time

-

Location

TBD

Modern cloud infrastructure is complex. It can comprise a wide range of connected hosts, containers, managed cloud services, and of course cloud resources like blob storage, users and roles, and the cloud control plane. To effectively secure cloud infrastructure, it’s critical to correlate information from a variety of sources, including information about the state of resources coupled with detection of suspicious and anomalous activity within those resources. In this workshop you will learn by acting as both attacker and defender. You will attack your infrastructure using the latest popular attack vectors for cloud environments You will then use Datadog to detect and respond to your attack, and capture the entire attacker lifecycle.

sharing to your network