LP_Cloud _Offensive_Webinar

Please enter your details below to watch on-demand

Overview:

Black Hat trainer and accredited pen-tester Scott Isaac will explore recently publicised cloud security breaches, accompanied by real-world examples of how reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners.
 

You will learn and hear about:

  • Examples and case studies of past cloud hacks
  • How cloud security differs from conventional security
  • Using cloud services to perform continuous monitoring

Register to join, we look forward to talking to you.

 

Target audience:

This webinar is for those with existing experience in or planning to move into cloud environments, and who want to learn about common types of cyberattacks against data and applications in the cloud.

 

About the speaker:

Scott Isaac, Black Hat Trainer, and accredited Pen Tester, will explore recently publicized Cloud Security Breaches, accompanied by real-world examples of how available reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners. Scott is the author of Hacking and Securing Cloud Infrastructure.