

Brian Contos
Field CISO, Mitiga
San Francisco, California, United States
Actions
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has ~30 years in the security industry as a security company entrepreneur, board advisor, investor, and author. After getting his start with the Defense Information Systems Agency (DISA) and later Bell Labs, Brian began the process of building security startups and taking multiple companies through successful IPOs and acquisitions, including Riptech, ArcSight, Imperva, McAfee, Solera Networks, Cylance, JASK, Verodin, and Mandiant.
Brian has worked in over 50 countries across six continents. He authored the book Enemy at the Water Cooler and co-authored Physical & Logical Security Convergence with former NSA Deputy Director William Crowell. He was featured in the cyberwar documentary 5 Eyes alongside General Michael Hayden, former NSA, and CIA Director. Brian writes for Forbes and regularly presents at conferences like Black Hat, RSA, OWASP, and BSides.
Area of Expertise
Topics
Hack The Cloud: Attackers Love Blind Spots, Break Their Hearts
Malicious actors, on an unholy crusade, have discovered that a lack of visibility across Cloud, SaaS, and Identity, combined with legacy controls that provide limited cloud detection and response capabilities, grants them a nefarious advantage. This lack of visibility, detection, and response in cloud environments allows malicious actors to operate with an elevated ability to breach organizations, evade detection, and maintain persistence.
As businesses transition to the cloud, critical assets, sensitive data, and an increasing array of interconnected SaaS applications have followed. This shift attracts malicious actors eager to exploit any visibility gaps, such as those caused by the segmentation of environments across workloads and SaaS. While such segmentation is a beneficial security best practice for incident prevention, it also provides a stealthy refuge for attackers. In essence, your SecOps team is operating within a landscape fraught with invisible threats.
This presentation will explore real-life stories from the trenches, drawn from years of cloud-based incident response. Various hacks will be explored to illustrate how breaches occur, what happens following a breach, and why organizations are struggling to detect and respond.
Finally, we will cover mitigation strategies such as proactively preparing for a breach, discovering malicious activity, and responding. Malicious actors are counting on your passivity, your blind spots, and your inability to effectively detect and respond to attacks in the cloud. Break their hearts!
Attendee Takeaways
• Understand how malicious actors exploit cloud visibility gaps.
• Explore demonstrations that illustrate breach techniques.
• Learn about real-life incidents detailing breach methods and detection challenges.
• Leave with mitigation strategies.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top