Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices

You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.

AWS CloudTrail records every administrative action and configuration change in your AWS account, but CloudTrail does not prioritize events based on threats.

In this webinar, we will discuss:

  • Overview of the threat matrix landscape
  • Impact of Suspicious Events within an organization
  • CloudTrail as the trusted point of record
  • Configuration-based threats - Defined
  • Continuous Cloud security monitoring vs traditional CSPM concepts
  • Detecting and responding to threats using Sysdig Secure

Speakers:

Anna Belak, Director of Thought Leadership, Sysdig; Brett Wolmarans, Technical Marketing Manager, Sysdig; Faisal Pias, Partner Solution Architect AWS

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.