Все публикации

Keynote | The Latest Cloud Security Megatrend: AI for Security

Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform

Real World Lessons Learned from 18 months of CIEM implementations in the Enterprise

Detection and remediation playbook in GCP

Detective Controls in K8s Environments – Wrangling Security Data Out Of Your Clusters

Cloud Security: What Works and What Doesn't

Keynote | Go Beyond Gatekeeping: A Systems Design Approach to Security Engineering

Modernizing Cloud Vulnerability Management with Serverless, Containers, and IaC

Scaling Identity & Access in Multi-Account Enterprises: Complexities & Strategies for Effective IAM

Policy as Code: strengthening governance and security in cloud infrastructure

Steve Tran: Hacker, Magician, Police Officer, and CISO: Season 2, Ep 8

Hands On Workshop Building Better Detections AWS Edition

Deneen DeFiore: Being a Business Focused CISO, CIO, and Board Member: Season 2, Ep 7

Enterprise Cloud Security Architecture Patterns

Mastering Cloud Security Policy Code

Kapil Assudani: Cloud, AI, and Reducing the Attack Surface | Season 2, Episode 6

Bridge to the Clouds: Unifying Worlds with Entra ID in Hybrid Landscapes

Mike Melo: The Case for DSPM vs. CSPM | Season 2, Episode 5

Jadee Hanson: Balancing CISO, CIO, and Product Leadership | Season 2, Episode 4

Advancing Your Cloud Security Journey

Bernard Brantley: Cutting Edge Cloud Thinking and Team Building | Season 2, Episode 2

Brett Cumming: Saying Yes Led to a Career in Cybersecurity | Season 2, Episode 3

Rinki Sethi: From Analyst to CISO and Board Member | Season 2, Episode 1

Hands-On Workshop: Destroying Long-Lived Cloud Credentials with Workload Identity Federation

welcome to shbcf.ru