Cloud means more services to monitor, a wider attack surface, and more tools, leading to blindspots. In fact, lack of visibility in a cloud environment is what contributed to the infamous Capital One AWS breach in 2019.
- What log sources are most important to monitor to identify indicators of attacker techniques early and respond quickly to contain a breach
- Why misconfigurations occur, how they can lead to data breaches, and what you should do to detect them
- How cloud monitoring differs from monitoring on-premises environments like Microsoft Active Directory
- How to get the most value out of a SIEM so you can detect and prevent cloud threats
Nato Riley, Integrations Engineer, Blumira
Nato is dedicated to helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses. Prior to joining Blumira, he held roles at LogRhythm and Data Network Group. Other ventures include notiaPoint, Inc., where Nato invented the Olympiad, a toolbox that makes large scale projects and deployments for cloud development projects more secure and agile. In his spare time, Nato runs a YouTube channel, Nato as Code, where he discusses topics such as infrastructure as code and building a cybersecurity career.