Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Cloud Security Engineering: The Profession of t...
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Sena Yakut
September 21, 2024
0
69
Cloud Security Engineering: The Profession of the Future
Sena Yakut
September 21, 2024
Tweet
Share
More Decks by Sena Yakut
See All by Sena Yakut
AWS Cloud Security Fundamentals
senayakut
0
29
When Cloud Security Meets AI: A Playbook for the Future Leaders
senayakut
0
48
Oops, I Broke It Again - Practicing Safe Chaos in the Cloud
senayakut
0
49
Your AWS Account Got Hacked. What Happens Now?
senayakut
0
55
From Prompt to Prediction: Understanding LLM Outputs
senayakut
0
35
Thank U, Next... Prompt - Securing Generative AI Like a Queen
senayakut
0
66
Dangerous by Design Cloud Security Flaws We Keep Repeating
senayakut
0
360
re:Inforce 2025 - Serverless Threat Response for Amazon S3 Malware Detection
senayakut
0
75
Falling in Love with the Cloud – Securely
senayakut
0
86
Featured
See All Featured
Facilitating Awesome Meetings
lara
57
6.8k
WCS-LA-2024
lcolladotor
0
450
Discover your Explorer Soul
emna__ayadi
2
1.1k
How to Talk to Developers About Accessibility
jct
2
130
Claude Code どこまでも/ Claude Code Everywhere
nwiizo
61
52k
Product Roadmaps are Hard
iamctodd
PRO
55
12k
Making Projects Easy
brettharned
120
6.6k
Test your architecture with Archunit
thirion
1
2.2k
Art, The Web, and Tiny UX
lynnandtonic
304
21k
Context Engineering - Making Every Token Count
addyosmani
9
660
Let's Do A Bunch of Simple Stuff to Make Websites Faster
chriscoyier
508
140k
The Language of Interfaces
destraynor
162
26k
Transcript
Sensitivity: Public Cloud Security Engineering The Profession of the Future
Sena Yakut, CyberKonf Istanbul
Sensitivity: Public ® aws sts get-caller-identity Sena Yakut, Cloud Security
Architect @CyberWhiz All details, links about me:
Sensitivity: Public Rise of the cloud computing is undeniable. Read
all report:
Sensitivity: Public Rise of the cloud security is undeniable. •
Great time to enter this field • Companies are looking experts who can secure their cloud environments. • Cloud security → Young profession • Lots of work, less talent Melting Face Emoji - what it means and how to use it
Sensitivity: Public So, what is cloud security engineering? • Means
different for different companies (SOC, Site Reliability Engineer, AppSec Engineer etc.)
Sensitivity: Public So, what is cloud security engineering? • Should
be comfortable with different tech stacks: • From serverless to containers, • From zero to hero.
Sensitivity: Public So, what is cloud security engineering? • Automation
is everything for us. • Design, develop, maintain security tasks with automation. • Integrate them into the development lifecycle.
Sensitivity: Public So, what is cloud security engineering? • Works
close with different teams → AppSec, DevOps, Pentest, VM... • I said we have lots of work Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Make time to
learn every day. Believe me. Everyday. • Read eveything.
Sensitivity: Public What should we do? • Avoid significant gaps
in your knowledge. • Be paranoid. Be curious. Always ask “How can I secure this?”
Sensitivity: Public What should we do? Sometimes, you need to
handle this by yourself.
Sensitivity: Public What should we do? • Avoid relying on
AI chatbots. Do research. Really. • Do experiment, build something, broke something in the cloud.
Sensitivity: Public What should we do? • Analyze open source
projects. • Learn CI/CD – DevSecOps: AWS Inspector for Code Quality, VM etc.
Sensitivity: Public What should we do? • Understand & learn
container security • Documentation → Write everything when you test. Melting Face Emoji - what it means and how to use it
Sensitivity: Public What should we do? • Learn IaC, start
with AWS. • Certifications???
Sensitivity: Public What should we do? CS Coding Version Control
Security Concepts OS Networking Scripting Software Design Principles OWASP Top 10 Auth Systems Cryptography
Sensitivity: Public Questions?