filmov
tv
Navigating Cyber Security in a Cloud Landscape • Richard Miller • YOW! 2018
![preview_player](https://i.ytimg.com/vi/jqkwVmvIcG0/maxresdefault.jpg)
Показать описание
This presentation was recorded at YOW! 2018. #GOTOcon #YOW
Richard Miller - CTO at Prospa
ORIGINAL TALK TITLE
Instrument Flight Rules - Navigating Cyber Security in a Cloud Landscape
ABSTRACT
There was a time when protecting the perimeter was the primary means of defending your organisation’s digital assets. Keeping the firewall patched and managing and auditing the firewall ruleset was right at the top of the list of security priorities. Intrusion detection and prevention was all the rage. Today, more and more of our digital assets are moving out beyond the company borders. Flexible working means access from home, public wifi hotspots, airport lounges and now even from 30,000 feet above the oceans. VPN tunnels into the company was all that was required to enable remote access, but today key data resides outside of the company, rendering the VPN tunnel virtually useless.
Cloud technologies provides incredible agility and scale and the ability to roll out new products and services at a pace that was simply not achievable twenty years ago. Those that are not embracing these technologies risk being left behind in the ever more competing landscape. However, as with all new technologies, new challenges arise and cyber security in the new world is no different.
In this talk, we’ll look into the differences between cyber defence before and after the cloud. We’ll look into just how much of your data exists beyond the firewall, even for companies that believe they have not yet moved to the cloud. We’ll look at what can be done holistically to protect your data and discuss technologies that are specifically designed to address cloud security challenges. [...]
TIMECODES
0:00 Introduction
0:14 Navigating Cyber Security in a Cloud Landscape
2:49 The perimeter is dead
6:50 rd party complacency
9:20 Understand your risk appetite 2. Identify your crown jewels 3. Proportional defense
9:39 Define Framework and Roadmap
14:13 Create a cyber
15:08 Run regular phishing simulations
18:42 Web application firewall
19:43 Cloud Access Security Brokers (CASB)
21:35 Regular penetration tests
22:39 Secure code training
25:57 Solid incident response plan
#SoftwareEngineering #CTO #Security #CyberSecurity #SoftwareDevelopment #Programming #RichardMiller #CyberSecurityTutorial #cybersecuritytrainingforbeginners #YOWcon
Looking for a unique learning experience?
SUBSCRIBE TO OUR CHANNEL - new videos posted almost daily.
Richard Miller - CTO at Prospa
ORIGINAL TALK TITLE
Instrument Flight Rules - Navigating Cyber Security in a Cloud Landscape
ABSTRACT
There was a time when protecting the perimeter was the primary means of defending your organisation’s digital assets. Keeping the firewall patched and managing and auditing the firewall ruleset was right at the top of the list of security priorities. Intrusion detection and prevention was all the rage. Today, more and more of our digital assets are moving out beyond the company borders. Flexible working means access from home, public wifi hotspots, airport lounges and now even from 30,000 feet above the oceans. VPN tunnels into the company was all that was required to enable remote access, but today key data resides outside of the company, rendering the VPN tunnel virtually useless.
Cloud technologies provides incredible agility and scale and the ability to roll out new products and services at a pace that was simply not achievable twenty years ago. Those that are not embracing these technologies risk being left behind in the ever more competing landscape. However, as with all new technologies, new challenges arise and cyber security in the new world is no different.
In this talk, we’ll look into the differences between cyber defence before and after the cloud. We’ll look into just how much of your data exists beyond the firewall, even for companies that believe they have not yet moved to the cloud. We’ll look at what can be done holistically to protect your data and discuss technologies that are specifically designed to address cloud security challenges. [...]
TIMECODES
0:00 Introduction
0:14 Navigating Cyber Security in a Cloud Landscape
2:49 The perimeter is dead
6:50 rd party complacency
9:20 Understand your risk appetite 2. Identify your crown jewels 3. Proportional defense
9:39 Define Framework and Roadmap
14:13 Create a cyber
15:08 Run regular phishing simulations
18:42 Web application firewall
19:43 Cloud Access Security Brokers (CASB)
21:35 Regular penetration tests
22:39 Secure code training
25:57 Solid incident response plan
#SoftwareEngineering #CTO #Security #CyberSecurity #SoftwareDevelopment #Programming #RichardMiller #CyberSecurityTutorial #cybersecuritytrainingforbeginners #YOWcon
Looking for a unique learning experience?
SUBSCRIBE TO OUR CHANNEL - new videos posted almost daily.
Комментарии