Security and operations teams often feel a loss of control in the world of cloud. With things constantly changing in a dynamic environment, how do you identify and prioritize the “real” risks – right now?
Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?
In this session, we will discuss and demo:
- The current threat landscape and impact of not knowing
- Continuous cloud security monitoring vs traditional CSPM
- Key considerations when implementing cloud security
- Threat detection and response using Sysdig Secure – built on open source Falco
Durgesh Shukla, Senior Product Marketing Manager