

ThreatStack: Data Driven Cloud Security with Pete Cheslock and Patrick Cable - Episode 25
Apr 1, 2018
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Introduction
00:00 • 2min
How Did You Get Involved in Data Management?
01:42 • 2min
Threat Stack
03:29 • 4min
Is There Any Overlap With Threat Stack Tools Like Snort or Suracato?
07:32 • 3min
What's the Flow of Cloud Trail Events?
10:12 • 5min
How Do You Ensure That Your Event Data Is in the Right Format?
14:48 • 4min
Security
18:55 • 3min
The Colonel Is the Source of the Truth
21:56 • 3min
Scaling on the Cloud
24:29 • 2min
Rabbitm Cue
26:48 • 5min
How Do You Determine When to Alert Your Users?
32:04 • 4min
Using Thread Stack to Identify Known Threats
35:35 • 4min
What Are Some of the Most Common Types of Vulnerabilities That You've Noticed in Customer Environments?
39:25 • 4min
The Most Challengesome Aspects of Data Infrestructure
43:17 • 3min
How Do You Store and Manage Your Data?
45:57 • 3min
What's the Biggest Gap in Data Management?
49:07 • 3min