This paper is intended for technical stakeholders across IT, such as cloud/datacenter architects, frontline service desk personnel, security analysts consuming logs from cloud sources, and CISOs formulating policy and security controls around 365 and Azure.
We will discuss the following topics from ActZero’s area of expertise, detection, and response:
• HOW cloud compromises serve as effective stepping stones to other parts of one’s environment.
• WHY the cloud is so challenging to secure, and how this makes your detection and response capabilities more important than ever before — especially when it comes to remote employees.
• SPECIFIC EXAMPLES of threats and exploits targeting your Microsoft investments, and use-cases for securing them.