Speaker

Brian Contos

Brian Contos

Field CISO, Mitiga

San Francisco, California, United States

Actions

With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has ~30 years in the security industry as a security company entrepreneur, board advisor, investor, and author. After getting his start with the Defense Information Systems Agency (DISA) and later Bell Labs, Brian began the process of building security startups and taking multiple companies through successful IPOs and acquisitions, including Riptech, ArcSight, Imperva, McAfee, Solera Networks, Cylance, JASK, Verodin, and Mandiant.

Brian has worked in over 50 countries across six continents. He authored the book Enemy at the Water Cooler and co-authored Physical & Logical Security Convergence with former NSA Deputy Director William Crowell. He was featured in the cyberwar documentary 5 Eyes alongside General Michael Hayden, former NSA, and CIA Director. Brian writes for Forbes and regularly presents at conferences like Black Hat, RSA, OWASP, and BSides.

Area of Expertise

  • Information & Communications Technology

Topics

  • Cyberwar
  • Cybercrime
  • Cybersecurity
  • IoT
  • Asset Intelligence
  • Hacking
  • Technology Startups
  • Information Technology
  • network security
  • Computer Security
  • Information Security
  • Information Security Governance and Risk
  • InfoSec
  • Technical Leadership
  • Cloud Security
  • Cloud & Infrastructure
  • Cloud Computing on the Azure Platform
  • Google Cloud
  • Cloud Technology
  • Cloud Security Architecture
  • Cloud App Security
  • Cloud strategy
  • Cloud Automation
  • google cloud platform
  • CDR
  • Cloud Detection and Response

Hack The Cloud: Attackers Love Blind Spots, Break Their Hearts

Malicious actors, on an unholy crusade, have discovered that a lack of visibility across Cloud, SaaS, and Identity, combined with legacy controls that provide limited cloud detection and response capabilities, grants them a nefarious advantage. This lack of visibility, detection, and response in cloud environments allows malicious actors to operate with an elevated ability to breach organizations, evade detection, and maintain persistence.

As businesses transition to the cloud, critical assets, sensitive data, and an increasing array of interconnected SaaS applications have followed. This shift attracts malicious actors eager to exploit any visibility gaps, such as those caused by the segmentation of environments across workloads and SaaS. While such segmentation is a beneficial security best practice for incident prevention, it also provides a stealthy refuge for attackers. In essence, your SecOps team is operating within a landscape fraught with invisible threats.

This presentation will explore real-life stories from the trenches, drawn from years of cloud-based incident response. Various hacks will be explored to illustrate how breaches occur, what happens following a breach, and why organizations are struggling to detect and respond.

Finally, we will cover mitigation strategies such as proactively preparing for a breach, discovering malicious activity, and responding. Malicious actors are counting on your passivity, your blind spots, and your inability to effectively detect and respond to attacks in the cloud. Break their hearts!

Attendee Takeaways
• Understand how malicious actors exploit cloud visibility gaps.
• Explore demonstrations that illustrate breach techniques.
• Learn about real-life incidents detailing breach methods and detection challenges.
• Leave with mitigation strategies.

Brian Contos

Field CISO, Mitiga

San Francisco, California, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top