The Fog of Cloud Security Logging

The Fog of Cloud Security Logging

RSA Conference via YouTube Direct link

Use-case: Network & Resource visibility for Security Events

21 of 22

21 of 22

Use-case: Network & Resource visibility for Security Events

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Fog of Cloud Security Logging

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Public Cloud Security Threats
  3. 3 Opportunities To Detect Attacks, Data Exfiltration
  4. 4 Clear The Log Fog
  5. 5 Public Cloud Security Program
  6. 6 Approach
  7. 7 Cloud Logs by Cloud Services
  8. 8 Monitor Critical Events & Activities
  9. 9 Context Based Monitoring
  10. 10 Log Types, Critical Events & Attributes
  11. 11 Cloud Security Insights Matter
  12. 12 Multi-Cloud Logging Architecture - On-Premises SIEM
  13. 13 Multi-Cloud Logging Architecture - CSP Cloud SIEMS
  14. 14 Critical Attributes For Log Monitoring
  15. 15 AWS Network Log
  16. 16 Use-case: System visibility for Compute
  17. 17 Use-case: AWS Audit Logging
  18. 18 Use-case: Network visibility for Security Events
  19. 19 Azure Active Directory Logs
  20. 20 Use-case: Automated Agent Deployment
  21. 21 Use-case: Network & Resource visibility for Security Events
  22. 22 Take Away Checklist

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.