Join security expert Yishai Beeri, CloudLock’s director of cybersecurity research and CyberLab manager, for a live demonstration on how to build and deliver cloud malware via OAuth. During the interactive session, we’ll cover the methods used to reverse engineer the attack, including detailing how attackers mask their identity and undermine detection methods, explore tactics to pinpoint their location, grasp techniques to determine files accessed, and reveal detection markers. Once familiar with this threat vector, we’ll review some of the common cloud security measures such as gateways, MFA, geolocation, and user behavior analytics, and assess their strengths and weakness in defending against OAuth threats. Finally we construct a solid strategy for each of the Protect, Detect and Respond functions for this type of threat, and touch on possibilities for Identify and Recover as well. Audience participation is strongly encouraged.
See Cisco Cloudlock in action from one of our cloud security experts
Your browser version is outdated.
We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!
Click on the icon below to download the latest version of your browserClose