A Wizards Guide to Security in the Cloud

By Ell Marquez

Elevator Pitch

Death Eaters are able to not only compromise our Castles [environments] easily, but wreck havoc before we know their there. However defeating them is not as difficult as we make it because in the end the rot cause of all cyber attacks is unauthorized spells, wait, I mean unauthorized code.

Description

A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has hidden a fragment of his or her soul [code] for the purpose of attaining immortality [persistence.]

Creating a Horcrux gives one the ability to anchor their own soul [code] to earth [environment], if the body [process] is destroyed.

In this session, we will come to understand how attackers are able to not only compromise our cloud environments but also maintain persistence—while our security teams are distracted by a mountain of false alerts. If we focus on the root cause of all cyber attacks: unauthorized spells, wait, I mean unauthorized code.