Talk With an Expert

A Comprehensive Approach to Cloud Threat Detection and Response

A Comprehensive Approach to Cloud Threat Detection and Response (PDF, 1.87MB)Published: 28 Jun, 2022
Created by:
Jake Williams
Jake Williams

Lifting and shifting workloads to the cloud without tooling changes is a losing proposition. Instead, deploying a cloud-native tooling stack using a combination of agentless and agent-based technologies can maximize your ability to rapidly find, focus, and fix security issues.

Meet the expert

Jake Williams
Jake Williams

Jake Williams

Senior Instructor

Jake runs a successful Infosec consultancy. He's been involved in high-profile public sector cases, including the malware analysis for the 2015 cyber-attack on the Ukraine power grid. He's also a regular speaker at industry conferences.

Read more about Jake Williams