Featured Speakers
Agenda | August 25th | 11:00 AM - 3:15 PM
Schedule | Description |
---|---|
11:00 AM | SANS Welcome
Frank Kim, SANS Fellow |
11:15 AM | Opening CommentsDiana Kelley & Ed Moyle, Co-Founders Security Curve |
TBD | Building a Foundational Cloud Security Strategy in Google CloudAs more organizations embrace cloud migration, security operations and architecture teams are facing new challenges. We largely moved past the days of “lift and shift,” where many traditional on-premises security controls and processes are copied without much analysis to the cloud. Now we’re evolving into a much more cloud-native phase where highly agile teams are building complex and more interconnected applications than ever, using native technologies built by cloud providers. Nowhere is this more true than in Google Cloud, embracing the theme “always be innovating”. This session will help enterprise security teams build a sound operational security strategy in Google Cloud, starting with threat modeling to help determine where and how to focus best. Then we’ll explore best practices for implementing strong security capabilities in all three pillars within Google Cloud, leaving attendees with a guide for building and operating their own security architecture within the Google Cloud Platform that grows with them as their cloud footprint expands. Dr. Anton Chuvakin, Leader of the security solution strategy at Google Cloud & Dave Shackleford, SANS Senior Instructor |
TBD | Blue Skies and CloudsIs identity the new perimeter? When we use a Virtual Private Network (VPN), what is it that we use to gain access? Identity. In essence, Identity is the center point of our systems and when it comes to the cloud, that concept is supercharged. Microsoft has a rich history in Identity and Authentication. It is without question that when your organization needs to use a Microsoft Service, identity will be involved. How can attackers subvert your security controls and gain access to your environment? How can you detect unauthorized access efficiently and effectively? What can you do to regain and retain control of your environment following an incident? This session will look at attackers and how they will attempt to subvert these systems, and what can occur in both Azure Active Directory and the Azure Platform itself. Using real life examples, we will provide best practice recommendations and insights into how these incidents occurred. Learning from use these cases with an eye to best practices will help prepare you with best practices for potential attacks. Dr. Roberto Bamberger, Senior Principal Consultant in Microsoft’s Detection and Response Team (DaRT) & Moses Frost, SANS Senior Instructor |
TBD | Break |
TBD | Top 3 Cloud Security Weaknesses, Misunderstandings, and MitigationsMany of the threats the industry faces in the cloud can be combatted with secure cloud configuration and tooling. Unfortunately, because the service landscape contains hundreds of cloud services, security practitioners are overwhelmed and underinformed. Their job gets even harder in a multicloud environment, where seemingly small differences between the clouds have immense security implications. This session will cover the top cloud security weaknesses the panelists have observed in 2022, the attacks that exploit them, the misunderstandings that make defense more difficult, and the correct mitigations to use in the Big 3 Cloud providers. Brandon Evans, SANS Certified Instructor, Pierre Lidome, SANS Certified Instructor Candidate & Aaron Cure, SANS Certified Instructor |
TBD | Panel Discussion
Abstract TBDModerator- Diana Kelley, Panelists - Dr. Anton Chuvakin, Dr. Roberto Bamberger, Brandon Evans |
TBD | Closing RemarksFrank Kim, SANS Fellow |