5 Attack Tactics to Guard against using MITRE ATT&CK for AWS

As cloud threats continue to rise, understanding an adversary’s tactics, techniques and procedures (TTPs) is critical to strengthening cloud security. How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads? In this session, we will:

  • Dive into a comprehensive view of the MITRE ATT&CK for Cloud Matrix
  • Explore real attack scenarios and best practices to detect them
  • Advise on how to establish a unified threat detection strategy for containers and cloud services on AWS
  • Share how open source tools like Falco provide IDS capabilities to help you build a more secure cloud

Speakers:

Eric Carter, Director of Product Marketing, Sysdig; Durgesh Shukla Sr PMM, Sysdig

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.