YoVDO

How to Exploit Cloud Adoption for Making Your IT More Secure and Convenient for End Users - DefCamp #10

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Splunk Courses Cloud Adoption Courses Data Encryption Courses Multifactor Authentication Courses

Course Description

Overview

Explore a conference talk from DefCamp #10 on leveraging cloud adoption to enhance IT security and user convenience. Delve into topics such as deepfakes, threat evolution, identity and encryption, data protection strategies, and cloud migration. Learn about various implementation types, including volumetric transparent encryption, live data transformation, and application layer encryption. Discover how to secure identities, implement multifactor authentication, and apply these concepts to real-life scenarios. Gain insights from Telus' experience and explore practical examples using tools like Splunk for security intelligence.

Syllabus

Introduction
Who is Telus
What is IT security
Deepfake
Threat evolution
Identity and encryption
Data encryption
Structure of the solution
Scenario sources
Type of implementation
volumetric transparent encryption
live data transformation
transparent encryption
application layer encryption
hardware appliance
security intelligence
Splunk example
IT infrastructure to cloud
Secure your identity
Credentials
Multifactor authentication
Real life scenarios


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube