Join the webinar: Monday 16th August, UK: 16:00 - 17:00 BST
USA: 08.00 - 09:00 PDT
USA: 11.00 - 12:00 EDT
Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester.
In the session, Scott will explore recently publicized Cloud Security Breaches, accompanied by real-world examples of how available reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners.
You will learn and hear about:
- Examples and case studies of the past cloud hacks
- How cloud security differs from conventional security
- Cloud infrastructure defense
- Using Cloud services to perform continuous monitoring and defense
The webinar is for those who want to know what different types of common cyberattacks are launched against data and applications in the cloud, and how best to defend against them. Ideal for those with existing cloud environments or those planning to move to a cloud environment.
Register to join, we look forward to talking to you.