Slide 1

Slide 1 text

Journey to the Cloud: An Introduction and Security Overview

Slide 2

Slide 2 text

About Me! • Senior Cloud Security Engineer @Lyrebird Studio • DevSecOps Team Lead & Senior CloudSec Engineer @PurpleBox • Cyber Security & CloudSec Engineer @Vestel • Master @Ege University senayakut.com /sena-yakut Security & Identity @sena_yakutt

Slide 3

Slide 3 text

Overview What is Cloud Computing? Why do We Need Cloud? Advantages of Cloud Computing Challenges of Cloud Computing Cloud Security – The Nightmare Cloud Security Statistics Cloud Security and AI Cloud Security and IoT Cloud Security and Data Analytics Automate Everything for Your Cloud

Slide 4

Slide 4 text

• Database storage, applications, and other IT resources, • Pay-as-you-go pricing, • Simple way to access servers, storage, databases and a set of application services What is Cloud Computing?

Slide 5

Slide 5 text

Why do We Need Cloud? • The data center management? • Power supply, cooling payments? • Hardware Maintenance? • Limited Scaling? • Earthquake, power shutdown, fire disasters? • Hire a team for monitoring? With cloud technology, we can solve all of them!

Slide 6

Slide 6 text

We are using some cloud services every day! Why do We Need Cloud?

Slide 7

Slide 7 text

Why do We Need Cloud?

Slide 8

Slide 8 text

Why do We Need Cloud?

Slide 9

Slide 9 text

Advantages of Cloud Computing Availability Reliability Ease of use Pay As You Go Security Accessibility

Slide 10

Slide 10 text

Challenges of Cloud Computing Lack of Skills Regulations Security Migration

Slide 11

Slide 11 text

Why is this so complex? • Lots of work to do, • Storage, server, database, IAM etc.. • Lack of cloud security and skills, • New technology, • Attackers love cloud & new exploits, • Changing existing architectures is complex • Cloud providers provides lots of security services à Our responsibility to use them! Cloud Security – The Nightmare

Slide 12

Slide 12 text

Cloud Security – The Nightmare

Slide 13

Slide 13 text

Cloud Security Statistics

Slide 14

Slide 14 text

Cloud Security Statistics

Slide 15

Slide 15 text

Cloud Security Statistics

Slide 16

Slide 16 text

Cloud Security and AI Automated Threat Intelligence: •Collecting, processing, and analyzing lots of data, •Gathering information from lots of environments identify emerging attacks targeting cloud environments, •AI faster than human analysis, •Threat alerts to security teams in real-time Anomaly Detection: •Normal user, system behavior or anomaly, •AI tools can analyze parameters like login attempts, data access patterns, API calls, and network traffic to flag outliers.

Slide 17

Slide 17 text

Cloud Security and AI Vulnerability Assessments: •Continuously identifying weaknesses in the infrastructure, applications, databases, containers, APIs, and other components, •Detect misconfigurations, risky permissions, and flaws Real Time Monitoring and Alerts: •Monitor suspicious behaviors, •Generate alerts from them, •Aware of the cloud security attacks.

Slide 18

Slide 18 text

•Lots of data, •Lots of work to do! •Sensors •Devices •Mobile apps •Web apps à Connectivity all of them! Cloud Security and IoT

Slide 19

Slide 19 text

Cloud Security and IoT

Slide 20

Slide 20 text

Cloud Security and Data Analytics • Detect threats before they impact your system, • Security information and event management systems (SIEM), • Identifying attack patterns is challenge, • Attackers are becoming more dynamic, using increasingly complex techniques and tactics

Slide 21

Slide 21 text

Automate Everything for Your Cloud • Delivery team's efficiency, • Improve the quality of systems and networks, • Reduce the risk associated with slow systems or downtime, • Reduce human errors.

Slide 22

Slide 22 text

Automate Everything for Your Cloud

Slide 23

Slide 23 text

No content