Home

Everyone is hackable. How long will it take you to notice?

%3CLINGO-SUB%20id%3D%22lingo-sub-865496%22%20slang%3D%22en-US%22%3EEveryone%20is%20hackable.%20How%20long%20will%20it%20take%20you%20to%20notice%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-865496%22%20slang%3D%22en-US%22%3EEven%20with%20the%20best%20cloud%20security%20team%2C%20solutions%2C%20and%20best%20practices%2C%20you%E2%80%99re%20not%20bullet-proof.%20There%20are%20so%20many%20perimeters%20and%20attack%20vectors%2C%20it%E2%80%99s%20not%20a%20question%20of%20IF%2C%20but%20WHEN.%20You%E2%80%99re%20unable%20to%20prevent%20every%20threat%3B%20you%20need%20to%20invest%20in%20detection%20as%20well.%20Once%20you%E2%80%99re%20hacked%2C%20it%E2%80%99s%20a%20matter%20of%20time.%20How%20fast%20can%20you%20detect%20the%20attack%2C%20analyze%20the%20vector%2C%20and%20remediate%20the%20incident%20to%20minimize%20damage%3F%20Shira%20Shamban%2C%20threat%20intelligence%20expert%20and%20cloud%20security%20researcher%20at%20Check%20Point%2C%20shares%2C%20post-mortem%2C%20a%20real-world%20hack%20and%20how%20it%20may%20have%20been%20avoided.%20She%20explains%20the%20challenges%20of%20threat%20detection%20and%20how%20to%20turn%20your%20logs%20into%20super-logs%2C%20which%20are%20then%20used%20by%20ML%20algorithms%20to%20automatically%20protect%20you.%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-865496%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EBRK2194%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Community Manager
Even with the best cloud security team, solutions, and best practices, you’re not bullet-proof. There are so many perimeters and attack vectors, it’s not a question of IF, but WHEN. You’re unable to prevent every threat; you need to invest in detection as well. Once you’re hacked, it’s a matter of time. How fast can you detect the attack, analyze the vector, and remediate the incident to minimize damage? Shira Shamban, threat intelligence expert and cloud security researcher at Check Point, shares, post-mortem, a real-world hack and how it may have been avoided. She explains the challenges of threat detection and how to turn your logs into super-logs, which are then used by ML algorithms to automatically protect you.

View this session in the session catalog

View session
Related Conversations
A problem with the Zoom level of a Tab
Tavory in Discussions on
9 Replies
Gain your competitive edge through ITFM
TiffanyRose in IT Transformation on
0 Replies
Gain your competitive edge with ITFM
TiffanyRose in IT Resources & Training on
0 Replies
Why End User Adoption is a Two-Way Street
Shannon O'Donald in Office 365 on
0 Replies