Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?

code red code red

In this session, we will explore the often-overlooked complexities of cloud configurations and their impact on our information security posture:

  • Unveiling the Hidden: Understanding the Intricacies of Cloud Environment Configurations as an Engineer from a Security Perspective  
  • Identifying Vulnerabilities: Selecting Configuration Rules for Enhanced Security
  • Setting the Standard: Leveraging Audit Standards and Security Benchmarks
  • Beyond the Basics: Comparing External Cloud Security Posture Management with Native Cloud Security Solutions

At the end of the session, you will be able to better understand the technology hidden behind CSPM and cloud scanners, how to leverage effectively our detection use-cases to align to threats your organization is facing, and how to align those to your existing role in cybersecurity as better protection your organizational security posture. 

The session is suitable for all-levels, technical and non-technical professionals, who are looking to learn more about how cloud configuration visibility can become a solution to your organizational security posture and maturity.
 

Interview:

What's the focus of your work these days?

I am currently working on automating a lot of existing processes in real-time security operations to narrow down the effort of the SOC and Incident Response team, the challenge I find is fine-tuning the process to our internal and external stakeholders, and I have recently found that focusing on metrics and true-positive rate helps my teams being focused on our effort and fine-tuning our capabilities effectively.

What technical aspects of your role are most important?

As part of my role, I need to stay up to date and constantly explore security feeds to acknowledge industry threats which can be aligned with my business. I need to be creative and advise my team from a technical perspective on how to automate and configure our capabilities to identify security risks, and my former experience as a Cloud Security Engineer has been very helpful to my knowledge sharing.

How does your InfoQ Dev Summit Munich session address current challenges or trends in the industry and those of the future?

Nowadays, companies are heavily invested in CSPM and CNAPP solutions, revealing misconfiguration in their cloud-based infrastructure. My session will explain how those are identified and what the profit is in understanding our organizational threats to fine-tune detection rules and selecting SaaS/cloud-native tooling, which will be efficient in identifying potential breaches. 


Speaker

Danielle Sudai

Security Operations Manager @Deliveroo, 10+ Years as Hands-on Specialist in Information Security, Top 100 IT Leaders in UK Awarded by Computing (2023)

Danielle leads Cloud Security Operations and SOC teams at Deliveroo. In her main role she is managing all of the Cloud Assets and SaaS solutions security monitoring in identifying real-time threats and security breaches.

Danielle is also a cloud security engineer, in her roles she co-engineered CSPM internal solution, reviewed and governed different cloud services from a security perspective, Cloud IAM misconfigurations and KMS services automation.

Read more
Find Danielle Sudai at:

Date

Friday Sep 27 / 01:20PM CEST ( 50 minutes )

Location

Ballroom B

Topics

Security Engineering Cloud Infrastructure

Share