­
Red Team vs. Blue Team on AWS - All Articles - CISO Platform

Red Team vs. Blue Team on AWS

Cloud attack vectors and security controls are different. Many companies breached on AWS moved sensitive data to AWS following best practices or implementing cloud security controls correctly. Reports indicate that hybrid cloud implementations have weaknesses and research finds that devs are the new security target. See Kolby Allen and Teri Radichel duke it out as Teri attacks an AWS account and Kolby defends it.

Speakers: Kolby Allen, Teri Radichel

Kolby Allen serves as a DevOps Engineer at ZipWhip. He has formerly held positions as an IT and Networking Consultant, Cloud Platform Engineer and Cloud Architect working with AWS, and is one of the co-organizers for the Seattle AWS Architects and Engineers Meetup. He is passionate about automation, microservices, containers, security and creatively utilizing the cloud to provide the best tools possible.

Teri Radichel taught herself BASIC on a TI99/4A in sixth grade. Her first technical job involved telecom and networking. She obtained a master of software engineering, founded a software and hosting business, and began researching security. At Capital One Investing she led a back-office engineering team and then helped with cloud migration and security automation. At WatchGuard she architected a platform based on her paper, Balancing Security and Innovation with Event Driven Automation. As Director of Security Research, she worked on M and A, research, presentations, and writing. Radichel holds multiple certifications and received the SANS 2017 Difference Makers Award. She is an AWS Hero, Seattle AWS Architects and Engineers Meetup Founder, and assists with SANS cloud classes.


Detailed Presentation:

(Source: RSA Conference USA 2018)
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee