Discover how to Hack and Secure Your Cloud Infrastructure
Watch on-demand
Discover How to Hack and Secure Your Cloud Infrastructure
Watch on-demand

Please enter your details below to watch on-demand
Overview:
Black Hat trainer and accredited pen-tester Scott Isaac will explore recently publicised cloud security breaches, accompanied by real-world examples of how reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners.
You will learn and hear about:
- Examples and case studies of past cloud hacks
- How cloud security differs from conventional security
- Using cloud services to perform continuous monitoring
Register to join, we look forward to talking to you.
Target audience:
This webinar is for those with existing experience in or planning to move into cloud environments, and who want to learn about common types of cyberattacks against data and applications in the cloud.
About the speaker:
Scott Isaac, Black Hat Trainer, and accredited Pen Tester, will explore recently publicized Cloud Security Breaches, accompanied by real-world examples of how available reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners. Scott is the author of Hacking and Securing Cloud Infrastructure.