Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Cloud Security Engineering: The Profession of t...
Search
Sena Yakut
September 21, 2024
0
67
Cloud Security Engineering: The Profession of the Future
Sena Yakut
September 21, 2024
Tweet
Share
More Decks by Sena Yakut
See All by Sena Yakut
When Cloud Security Meets AI: A Playbook for the Future Leaders
senayakut
0
40
Oops, I Broke It Again - Practicing Safe Chaos in the Cloud
senayakut
0
40
Your AWS Account Got Hacked. What Happens Now?
senayakut
0
52
From Prompt to Prediction: Understanding LLM Outputs
senayakut
0
33
Thank U, Next... Prompt - Securing Generative AI Like a Queen
senayakut
0
63
Dangerous by Design Cloud Security Flaws We Keep Repeating
senayakut
0
340
re:Inforce 2025 - Serverless Threat Response for Amazon S3 Malware Detection
senayakut
0
73
Falling in Love with the Cloud – Securely
senayakut
0
79
Amazon GuardDuty Energy - I See It. I Flag It. I Block It
senayakut
0
82
Featured
See All Featured
How to Think Like a Performance Engineer
csswizardry
28
2.4k
Tell your own story through comics
letsgokoyo
0
770
Building Experiences: Design Systems, User Experience, and Full Site Editing
marktimemedia
0
340
4 Signs Your Business is Dying
shpigford
187
22k
A Soul's Torment
seathinner
1
2k
Improving Core Web Vitals using Speculation Rules API
sergeychernyshev
21
1.3k
SEO for Brand Visibility & Recognition
aleyda
0
4.1k
sira's awesome portfolio website redesign presentation
elsirapls
0
91
Code Review Best Practice
trishagee
74
19k
Skip the Path - Find Your Career Trail
mkilby
0
27
Docker and Python
trallard
47
3.7k
Leo the Paperboy
mayatellez
0
1.3k
Transcript
Sensitivity: Public Cloud Security Engineering The Profession of the Future
Sena Yakut, CyberKonf Istanbul
Sensitivity: Public ® aws sts get-caller-identity Sena Yakut, Cloud Security
Architect @CyberWhiz All details, links about me:
Sensitivity: Public Rise of the cloud computing is undeniable. Read
all report:
Sensitivity: Public Rise of the cloud security is undeniable. •
Great time to enter this field • Companies are looking experts who can secure their cloud environments. • Cloud security → Young profession • Lots of work, less talent Melting Face Emoji - what it means and how to use it
Sensitivity: Public So, what is cloud security engineering? • Means
different for different companies (SOC, Site Reliability Engineer, AppSec Engineer etc.)
Sensitivity: Public So, what is cloud security engineering? • Should
be comfortable with different tech stacks: • From serverless to containers, • From zero to hero.
Sensitivity: Public So, what is cloud security engineering? • Automation
is everything for us. • Design, develop, maintain security tasks with automation. • Integrate them into the development lifecycle.
Sensitivity: Public So, what is cloud security engineering? • Works
close with different teams → AppSec, DevOps, Pentest, VM... • I said we have lots of work Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Make time to
learn every day. Believe me. Everyday. • Read eveything.
Sensitivity: Public What should we do? • Avoid significant gaps
in your knowledge. • Be paranoid. Be curious. Always ask “How can I secure this?”
Sensitivity: Public What should we do? Sometimes, you need to
handle this by yourself.
Sensitivity: Public What should we do? • Avoid relying on
AI chatbots. Do research. Really. • Do experiment, build something, broke something in the cloud.
Sensitivity: Public What should we do? • Analyze open source
projects. • Learn CI/CD – DevSecOps: AWS Inspector for Code Quality, VM etc.
Sensitivity: Public What should we do? • Understand & learn
container security • Documentation → Write everything when you test. Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Learn IaC, start
with AWS. • Certifications???
Sensitivity: Public What should we do? CS Coding Version Control
Security Concepts OS Networking Scripting Software Design Principles OWASP Top 10 Auth Systems Cryptography
Sensitivity: Public Questions?