Join security expert Yishai Beeri, CloudLock’s director of cybersecurity research and CyberLab manager, for a live demonstration on how to build and deliver cloud malware via OAuth. During the interactive session, we’ll cover the methods used to reverse engineer the attack, including detailing how attackers mask their identity and undermine detection methods, explore tactics to pinpoint their location, grasp techniques to determine files accessed, and reveal detection markers. Once familiar with this threat vector, we’ll review some of the common cloud security measures such as gateways, MFA, geolocation, and user behavior analytics, and assess their strengths and weakness in defending against OAuth threats. Finally we construct a solid strategy for each of the Protect, Detect and Respond functions for this type of threat, and touch on possibilities for Identify and Recover as well. Audience participation is strongly encouraged.
Ron Zalkind, CTO and co-founder at CloudLock (now part of Cisco), will explore the migration of on-prem threats to the cloud, presenting key research around connected cloud applications in the corporate setting and walk through a real case study. The audience will come away with crucial defensive measures to take and pitfalls to avoid in a quest to remain secure in this new era.
See the CloudLock CASB & cloud cybersecurity solution in action from one of our cloud security experts
Your browser version is outdated.
We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!
Click on the icon below to download the latest version of your browserClose