Navigating Cyber Security in a Cloud Landscape • Richard Miller • YOW! 2018

preview_player
Показать описание
This presentation was recorded at YOW! 2018. #GOTOcon #YOW

Richard Miller - CTO at Prospa

ORIGINAL TALK TITLE
Instrument Flight Rules - Navigating Cyber Security in a Cloud Landscape

ABSTRACT
There was a time when protecting the perimeter was the primary means of defending your organisation’s digital assets. Keeping the firewall patched and managing and auditing the firewall ruleset was right at the top of the list of security priorities. Intrusion detection and prevention was all the rage. Today, more and more of our digital assets are moving out beyond the company borders. Flexible working means access from home, public wifi hotspots, airport lounges and now even from 30,000 feet above the oceans. VPN tunnels into the company was all that was required to enable remote access, but today key data resides outside of the company, rendering the VPN tunnel virtually useless.

Cloud technologies provides incredible agility and scale and the ability to roll out new products and services at a pace that was simply not achievable twenty years ago. Those that are not embracing these technologies risk being left behind in the ever more competing landscape. However, as with all new technologies, new challenges arise and cyber security in the new world is no different.

In this talk, we’ll look into the differences between cyber defence before and after the cloud. We’ll look into just how much of your data exists beyond the firewall, even for companies that believe they have not yet moved to the cloud. We’ll look at what can be done holistically to protect your data and discuss technologies that are specifically designed to address cloud security challenges. [...]

TIMECODES
0:00 Introduction
0:14 Navigating Cyber Security in a Cloud Landscape
2:49 The perimeter is dead
6:50 rd party complacency
9:20 Understand your risk appetite 2. Identify your crown jewels 3. Proportional defense
9:39 Define Framework and Roadmap
14:13 Create a cyber
15:08 Run regular phishing simulations
18:42 Web application firewall
19:43 Cloud Access Security Brokers (CASB)
21:35 Regular penetration tests
22:39 Secure code training
25:57 Solid incident response plan

#SoftwareEngineering #CTO #Security #CyberSecurity #SoftwareDevelopment #Programming #RichardMiller #CyberSecurityTutorial #cybersecuritytrainingforbeginners #YOWcon

Looking for a unique learning experience?

SUBSCRIBE TO OUR CHANNEL - new videos posted almost daily.
Рекомендации по теме
Комментарии
Автор

Not a lot of new things here, but a solid summary talk. Nicely done.

Tony-dprl
Автор

We are currently releasing older YOW! videos to serve as a valuable archive, preserving historical content. It is possible that a video is perceived as outdated. We believe it offers insightful glimpses into the past, enriching our understanding of history and development.

GOTO-