Uncovering Hybrid Cloud Attacks Part 1 – Addressing the Speed of Cloud Attacks
In this first part of the series, we’ll explain why effective response is so challenging and provide an overview of the problem.
Yotam has spent over a decade managing and responding to some of the most sophisticated global cyber operations. He’s worked with technical teams and executives to defeat attacks and leverage cyber as a competitive advantage across incident response, purple teaming, posture enhancements, and executive wargames. In his current role, Yotam focuses on developing cloud-specific incident response methodology and preparing leading executives for evolving cybersecurity risks. Yotam’s previous positions include Director of Incident Response at Sygnia and command positions in elite IDF cybersecurity units. He holds a Bachelor’s degree in Economics and Political Science & International relations from the Open University of Israel and is currently a JD candidate at Georgetown University Law Center
In this first part of the series, we’ll explain why effective response is so challenging and provide an overview of the problem.
in this second part of the series, we’ll share the details of a real-world sophisticated, long-term attack in the cloud.
In the final section of this blog series on uncovering complex hybrid cloud attacks, we’ll share key elements of the response to the real-world sophisticated cloud attack outlined in Part 2.
This case study serves to highlight the importance of rapid, heuristic, accurate, and contextualized detection and response in the cloud.