Cloud Security Events

Come meet us

Security News: Stop Modern Threats and Supply Chain Attacks Natively in Cloud ( Click to View On-demand )

Live Webcast on Wednesday, 08 Sep 2021 1:00 PM EDT (08 Sep 2021 17:00 UTC)

Speakers: Dr. Arun Raman, VP of Cloud, Blue Hexagon, James Wenzel, Sr. Solutions Architect, Amazon Web Services

Modern cloud threats, such as supply chain attacks, use TTPs involving malware and command-and-control to infiltrate your VPCs through the network and persist in managed storage such as AWS S3 to achieve their objectives later. To mitigate such threats, AWS and Blue Hexagon recently announced new services and native integrations that combine to break new ground in supercharging your ability to block these threats natively and in real-time.

In this talk, we look at how Blue Hexagon’s AI Security integrates with AWS Gateway Load Balancer and AWS Network Firewall to detect and block threats at the most common first incursion point – the network. Furthermore, we explore how the same Deep Learning AI analysis engine connects via AWS S3 Object Lambda to transparently detect and stop lateral spread within your environment.

In this live session, DevSecOps and Security pros will learn how to:

● Deploy cloud service integrations for true multi-vector defense

● How to secure the cloud against modern threats, without requiring any code changes

● Maintain an effective runtime cloud security posture

● Reduce DevOps overhead and accelerate time to deploy

Why is Ransomware so tough to avoid? (Click here to View On-demand!)

AUGUST 17th ( 10 AM PDT )

Join John Petersen, Chief Information Officer, Heffernan Insurance Brokers Trends and Saumitra Das, CTO and Cofounder of Blue Hexagon to learn about Ransomware, the single largest malware impacting a new organization every 14 seconds, and what security leaders can do to avoid falling victim to this cybercrime.

Ransomware has now evolved from “encrypting the data on the machine until the ransom is paid” to more nefarious tasks, including disruption-ware, exfiltrating sensitive corporate data, all in attempts to disrupt business and force payment. And, with remote work on the rise, exploitation of remote access and user devices increases corporate exposure to ransomware even more.

What you’ll learn from this webinar:

● Key concepts of ransomware

● Trends observed in hundreds of ransomware attacks as well as new trends on the intent of ransomware actors

● Critical priorities for creating a cyber-resilient organization

● What should be your Ransomware toolkit

● New AI technologies and tools to cut through the rapidly changing threat landscape

Defending your Cloud with MITRE D3FEND (Click to View Recording)

AUGUST 12th ( 11 AM PDT )

Presented by: Dr. Neil Daswani, Co-Director of the Stanford Advanced Cybersecurity Program and Dr. Saumitra Das, CTO Founder, Blue Hexagon

Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security teams to reason about attacker tactics in their cloud. The newly announced MITRE D3FEND framework provides a standard vocabulary for countermeasures against attackers.

In this live session, we will provide an overview of D3FEND and how it maps to cloud security. We discuss the countermeasures security teams should consider that are specific to cloud attack tactics. We also discuss how ATT&CK maps to the technical root causes of breach that have impacted over 9,000 reported breaches to date.

Security experts and cloud DevOps/DevSecOps attendees will learn about:

● MITRE ATT&CK and differences between Cloud and On-premises

● How MITRE ATT&CK maps to the technical root causes of breaches

● MITRE D3FEND and how to apply and extend it for your cloud

● How to prioritize and deploy countermeasures based on D3FEND

Tales from the frontlines of nation-state attacks (Click to View Recording)

AUGUST 10th ( 10:15 AM PDT )

Speaker: Dr. Saumitra Das, CTO and Cofounder of Blue Hexagon

In just Q1 of 2021, there were already more than 20 documented high-impact state-sponsored attacks. These state-sponsored attackers have great operational security, are willing to lie low patiently, and persist to find the victim’s crown jewels versus smashing and grabbing, and they are increasingly utilizing the software supply chain and even the security supply chain and even the security supply chain to gain initial access.

This webcast covers key tactics being used by state-sponsored attackers in targeted intrusions with real battlefield examples including software supply chain infection, security supply chain exploits, evasive C2 and beaconing, AI and automation for malicious targeting and code generation, and lateral spread between on-premises to cloud to mobile.

Understanding these tactics provides a framework for reasoning about the most effective countermeasures. To deal with a sophisticated adversary, a multipronged approach is needed for defense that includes:

● Focusing on detection and response of the unknown versus rules-based prevention

● Supercharging security staff with tools that have an opinion versus just visualizing a ton of log data

● Reducing attack surface proactively

CloudSecNext Summit ( Jun 3-4, login to view on demand )

JUNE 4th ( 12:35 – 1:10 PM EDT ) – Shift-Left is Not Sufficient: Why Agentless Runtime AI Security is Necessary for the Cloud

Arun Raman, VP of Cloud Products, Blue Hexagon

There has been a huge hype about tools for dealing with cloud misconfigurations and cloud security posture. However, modern attacks on the cloud cannot be thwarted anymore by just shifting left. Attackers have moved to complex, multi-stage attacks that use supply chain infection, evasive beaconing, zero-day Linux malware, and ransoming cloud storage. These attacks only manifest at runtime, and defending against them requires multi-vector inspection of workload, network, storage, and control plane activity at runtime and in real-time. As importantly, the security architecture must provide full cloud coverage and must not introduce supply chain risk.

In this session, we will explore customer case studies on how an agentless runtime AI security approach helped defend against real-life modern cloud attacks.

We also demonstrate how such a solution can be deployed within minutes and easily maintained in complex multi-region, multi-VPC, multi-OS, multi-account, and multi-cloud architectures.

Webcast: How to Manage the Top 10 Cloud Security Risks ( View On-Demand )

In this session, we will go beyond the now pervasive and obvious example of open cloud storage buckets to discuss the top 10 modern cloud security risks with real-world examples.

Attendees will learn key techniques that they can deploy right away in their organization to:
– Mitigate cloud risks across multi-VPC, multi-OS, and multi-account deployment
– Detect unknown malicious code at the build, ship, and run stage
– Inspect and Analyze cloud network packets, API activity, and storage activity

Hear from Dr. Neil Daswani (former CISO of Lifelock and co-author of Big Breaches and Foundations of Security) and Dr. Saumitra Das (founder and inventor in AI security) about lessons learned from prior attacks and potential approaches to strengthen defenses against future attacks.

Ready to get started?
We’ll show you how fast we enable actionable visibility, real-time threat defense, and continuous compliance for your cloud.