
Sign up to save your podcasts
Or
Attendees
Guest: Shira Shamban
Guest title: Cloud Security
Company: Check Point (Dome9)
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
Abstract
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
0:00
Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL)
11:55
Introducing the challenges of cloud log management: enabling correctly, long term storage, analysis challenges, lack of info
19.45
The challenges of monitoring cloud assets using IP addresses
21:25
How to properly do cloud based log collection: Enrichment, external threat service
24.20
Values of log visualization
28.05
Log storage management
31:21
Summary and last words
5
33 ratings
Attendees
Guest: Shira Shamban
Guest title: Cloud Security
Company: Check Point (Dome9)
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
Abstract
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
0:00
Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL)
11:55
Introducing the challenges of cloud log management: enabling correctly, long term storage, analysis challenges, lack of info
19.45
The challenges of monitoring cloud assets using IP addresses
21:25
How to properly do cloud based log collection: Enrichment, external threat service
24.20
Values of log visualization
28.05
Log storage management
31:21
Summary and last words