Presented at
BSidesDC 2017,
Oct. 6, 2017, 8 a.m.
(540 minutes).
What, exactly, is “the Cloud”? Is it a network of machines connected via the Internet scattered all over the globe? Is it a data center environment located in the United States or anywhere in the world? Is it really just “someone else’s computer”? Or, is there more to it that needs to be understood by the Information Security professional, to arm him or her with enough knowledge to answer the tough question that inevitably will be asked by their employer, “Why should we take the risk to move our most sensitive data into the cloud?” To take it one step further, should in the event of a data breach that same employer should say, “We need to investigate how this happened;” what exactly will the Information Security professional need to know to successfully conduct a digital forensic investigation, especially if he or she doesn’t have direct access to the server or hardware?
Presenters:
-
Kerry Hazelton
Kerry Hazelton has been actively involved in the IT industry since 1998, and has a wide range of experience with systems and network support, data center operations, and information security. He considers himself a "cybersecurity enthusiast" due to his desire and motivation to read up on the latest trends within the industry, to learn about a new exploit or tool, or his willingness to teach and share with others his experiences over the years. These traits have helped him to continue to thrive in his current position as a Security Engineer for a major healthcare data analytics provider in the Washington, DC area, where he is responsible for managing their cloud security controls, incident response procedures, and security process development. He also has had the honor and privilege of presenting technical workshops at recent conferences, including BSides Charm, BSides DC, and BSides NoVA.
On a more personal level, Kerry has been married to his wife Tracy for fifteen years, and together they have one son, Benjamin; who has been affectionately given the handle of “TRGv2” as he is being encouraged to start thinking like an engineer and investigate how things work, and begin his journey into the art of defensive security (a.k.a. “Defence Against the Dark Arts”).
Kerry can be followed on Twitter under his handle: @therantinggeek.
Links:
Similar Presentations: