Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP

Security and operations teams often feel a loss of control in the world of cloud. With things constantly changing in a dynamic environment, how do you identify and prioritize the “real” risks - right now?

Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?

In this session, we will discuss and demo:

  • The current threat landscape and impact of not knowing
  • Continuous cloud security monitoring vs traditional CSPM
  • Key considerations when implementing cloud security
  • Threat detection and response using Sysdig Secure - built on open source Falco

Speaker:
Durgesh Shukla, Senior Product Marketing Manager

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.