Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Cloud Security Engineering: The Profession of t...
Search
Sena Yakut
September 21, 2024
0
73
Cloud Security Engineering: The Profession of the Future
Sena Yakut
September 21, 2024
Tweet
Share
More Decks by Sena Yakut
See All by Sena Yakut
AWS Cloud Security Fundamentals
senayakut
0
57
When Cloud Security Meets AI: A Playbook for the Future Leaders
senayakut
0
51
Oops, I Broke It Again - Practicing Safe Chaos in the Cloud
senayakut
0
52
Your AWS Account Got Hacked. What Happens Now?
senayakut
0
59
From Prompt to Prediction: Understanding LLM Outputs
senayakut
0
37
Thank U, Next... Prompt - Securing Generative AI Like a Queen
senayakut
0
67
Dangerous by Design Cloud Security Flaws We Keep Repeating
senayakut
0
370
re:Inforce 2025 - Serverless Threat Response for Amazon S3 Malware Detection
senayakut
0
76
Falling in Love with the Cloud – Securely
senayakut
0
88
Featured
See All Featured
世界の人気アプリ100個を分析して見えたペイウォール設計の心得
akihiro_kokubo
PRO
67
37k
The Cost Of JavaScript in 2023
addyosmani
55
9.8k
Navigating Team Friction
lara
192
16k
DBのスキルで生き残る技術 - AI時代におけるテーブル設計の勘所
soudai
PRO
62
51k
Done Done
chrislema
186
16k
SEOcharity - Dark patterns in SEO and UX: How to avoid them and build a more ethical web
sarafernandez
0
140
Rails Girls Zürich Keynote
gr2m
96
14k
Everyday Curiosity
cassininazir
0
160
Rebuilding a faster, lazier Slack
samanthasiow
85
9.4k
Designing Powerful Visuals for Engaging Learning
tmiket
0
270
The untapped power of vector embeddings
frankvandijk
2
1.6k
How to Ace a Technical Interview
jacobian
281
24k
Transcript
Sensitivity: Public Cloud Security Engineering The Profession of the Future
Sena Yakut, CyberKonf Istanbul
Sensitivity: Public ® aws sts get-caller-identity Sena Yakut, Cloud Security
Architect @CyberWhiz All details, links about me:
Sensitivity: Public Rise of the cloud computing is undeniable. Read
all report:
Sensitivity: Public Rise of the cloud security is undeniable. •
Great time to enter this field • Companies are looking experts who can secure their cloud environments. • Cloud security → Young profession • Lots of work, less talent Melting Face Emoji - what it means and how to use it
Sensitivity: Public So, what is cloud security engineering? • Means
different for different companies (SOC, Site Reliability Engineer, AppSec Engineer etc.)
Sensitivity: Public So, what is cloud security engineering? • Should
be comfortable with different tech stacks: • From serverless to containers, • From zero to hero.
Sensitivity: Public So, what is cloud security engineering? • Automation
is everything for us. • Design, develop, maintain security tasks with automation. • Integrate them into the development lifecycle.
Sensitivity: Public So, what is cloud security engineering? • Works
close with different teams → AppSec, DevOps, Pentest, VM... • I said we have lots of work Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Make time to
learn every day. Believe me. Everyday. • Read eveything.
Sensitivity: Public What should we do? • Avoid significant gaps
in your knowledge. • Be paranoid. Be curious. Always ask “How can I secure this?”
Sensitivity: Public What should we do? Sometimes, you need to
handle this by yourself.
Sensitivity: Public What should we do? • Avoid relying on
AI chatbots. Do research. Really. • Do experiment, build something, broke something in the cloud.
Sensitivity: Public What should we do? • Analyze open source
projects. • Learn CI/CD – DevSecOps: AWS Inspector for Code Quality, VM etc.
Sensitivity: Public What should we do? • Understand & learn
container security • Documentation → Write everything when you test. Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Learn IaC, start
with AWS. • Certifications???
Sensitivity: Public What should we do? CS Coding Version Control
Security Concepts OS Networking Scripting Software Design Principles OWASP Top 10 Auth Systems Cryptography
Sensitivity: Public Questions?