Users and Cloud Collide: Understanding Threat Vectors in the Enterprise Cloud Environment

Presented at BSidesDC 2016, Oct. 23, 2016, 2:30 p.m. (50 minutes).

With enterprise cloud adoption accelerating at an exponential pace, the traditional concept of a self-contained network with a defined perimeter is no longer valid. Users are now the perimeter, taking advantage of self-provisioning capabilities enabled by BYOx and cloud phenomena. This transformation is compounded by users augmenting core SaaS applications by self-selecting third-party apps, as well as the applications organizations build for themselves in the cloud. With the concept of a perimeter dissolving away, it’s important to understand what the cloud threat surface looks like and what it takes to detect a cloud breach.

This interactive session explores the cyber kill chain in the cloud and how new threat vectors emerge across cloud environments. Cybersecurity expert, CTO and co-founder at CloudLock, and head of the CloudLock CyberLab research intelligence arm, Ron Zalkind will walk through the inner workings of a cloud breach. He’ll explore four primary cloud threat vectors, present detailed cyber stats gleaned from research conducted by the CyberLab, and provide concrete steps organizations can take today to reinforce their cloud security posture.


Presenters:

  • Ron Zalkind - CTO and co-founder at CloudLock
    As CTO Ron is responsible for CloudLock’s overall technology and continuous innovation. Prior to founding CloudLock, Ron was Director of Product Management at Interwise (acquired by AT&T), and held varied Engineering Management positions in Private and Military sectors including the Israeli Air Force Software Development unit, where he worked on the development of mission critical intelligence systems. Ron has over 20 years of experience building complex software systems and product platforms.

Links:

Similar Presentations: