SlideShare uma empresa Scribd logo
1 de 21
SECURE	OPERATIONS		IN	
THE	CLOUD
LESSONS	LEARNED	FROM	AN	ATTACK	THE	WORLD	WAS	NOT	READY	FOR
Golan	Ben-Oni,	CIO
IDT	Corporation
QUOTE	FROM	OUR	SAGES
• “Every	single	thing	that	a	person	sees	or	hears,	is	an	instruction	…”	-Ba’al
Shemtov
WHO	IS	IDT?
FOUNDED	
1990
EMPLOYEES	
1400
INDUSTRY	
Telecom
OPERATIONS	
20	countries
IDT	corporation	(NYSE:	IDT)	is	a	
multinational	conglomerate	
headquartered	in	Newark,	New	Jersey	with	
operations	primarily	in	the	following	
industries:
• Telecommunications
• Energy	and	Oil
• Banking	and	Finance
• Media	and	Entertainment
• Pharmaceuticals
• Education
THE	SECURITY	CHALLENGE
• Security	is	becoming	increasingly	challenging	as	new	threat	actors	
emerge	and	increase	in	numbers.		The	number	of	successful	attacks	
against	organizations	have	increased,	despite	an	increase	in	spending.		
• Customer	Data	is	being	leaked,	Scripts	and	Television	Series	are	being	
stolen,	and	Intellectual	Property	is	walking	out	of	open	windows.
• Recent	attacks	has	caused	immense	damage	and	the	challenges	are	
great.
• We	are	told:	“Just	keep	us	out	of	the	New	York	Times	…”
PRIMARY	REASONS	FOR	WHERE	WE	ARE	TODAY
• Increase	in	sophistication	of	attacks	– including	the	release	of	state	sponsored	tools	into	the	open	
market.
• Costs	of	attack	vs.	defense
• Lack	of	Security	Subject	Matter	Experts
• Poorly	integrated	components	of	the	environment
• Lack	of	Visibility	and	Poor	Response	Times
IS	WHAT	WE’VE	BEEN	TOLD	TO	DO	REALLY	WORKING?
• Security	Hygiene:
• Keeping	Software	Up-To-Date
• Following	Best	Practices
• Keeping	Users	informed	about	Safe	Browsing
• “It	must	be	User	Error…”
• People	are	the	weakest	link
• Keeping	users	informed	and	properly	trained	
• (Demand	that	we	turn	every	employee	into	
Security	Subject	Matter	Experts)
CHALLENGES	IN	SECURITY
• In	order	to	meet	the	demand	of	strong	defenses,	we	met	with	and	discussed	the	challenge	with	the	N.S.A.	
who	simply	recommended	“deploy	three	of	everything…”		
• We	spent	years	evaluating,	deploying,	and	testing	security	technologies	– summarizing	findings,	efficacy	rates,	
false	positives	between	vendors.
• In	2013,	we	realized	that	although	we	addressed	an	important	visibility	gap,	we	had	not	yet	addressed	an	
important	need	around	orchestration	and	automation.
• On	average,	it	was	taking	us	between	30-45	minutes	to	address	important	alerts	that	were	arriving	into	our	
Security	Operations	Center.
• At	the	same	time,	the	Verizon	Breach	Report	began	identifying	that	breaches	of	customer	data	were	occurring	
in	a	moments	time,	with	over	40%	occurring	in	minutes.
• The	standard	approach	of	human-action	oriented	response	was	a	bit	like	bringing	a	knife	to	a	gunfight	–
attackers	began	utilizing	automation	themselves	and	we	were	too	slow	to	respond.
THE	ILLUSIVE	SILVER	BULLET
• With	hundreds	of	new	security	startups	appearing	regularly,	there	still	is	no	silver	bullet	in	security.
• Deploying	a	layered	defense	and	following	best	practices	is	important	to	do,	but	sometimes	you	can	do	
everything	you	believe	is	correct,	and	still	have	a	security	breach.		
• Attackers	will		find	the	weakest	link	in	your	environment	and	enter	there.
• What	is	most	important	here	is	to	be	in	a	regular	cycle	of	improvement	and	learning.
WALK	THROUGH	THE	EVENTS	OF	APRIL	29TH,	2017.
• Attackers	researched	and	cased	the	background	of	a	contractor	via	social	networks,	determining	who	
they	were,	what	they	did,	and	their	working	hours.
• Reverse	Engineered	NSA	Exploit	Tools	that	were	released	just	a	couple	weeks	earlier.
• Attack	took	place	during	the	one	day	the	contractor	did	not	work	(a	Saturday).
• For	the	attack	to	have	been	successful,	several	issues	needed	to	have	been	present:
• Firewall	,	including	local	host	firewall	was	DISABLED.
• Found	a	system	that	was	missing	MS17-010 a	critical	Microsoft	Patch	that	would	have	prevented	the	use	of	NSA	
Tools	DOUBLE-PULSAR and	ETERNAL	BLUE.
• In-Memory	process	level	injection	attack	that	leveraged	FILELESS	Malware	– standard	AV	did	not	detect	this.
STAGES	OF	ATTACK
• Disabling	of	Firewall	leveraging	an	previously	unknown	exploit	of	the	users	Cable	Modem
• Unauthenticated	remote	access	to	local	system	leveraging	NSA	exploit	tool	- ETERNAL	BLUE.
• Process	injection	into	LSASS.EXE	(a	protected	Windows	Process	responsible	for	user	session	and	
authentication).
• Injection	Communicated	with	C&C	and	downloaded	Credential	Theft	Module	which	stole	credentials	from	the	
Windows	Environment	and	Web	Browsers
• Attempt	to	move	laterally	(since	VPN	was	down	at	the	time,	this	was	not	possible).
• Ransomware	Encryption	(file-less	variant	based	on	CRY-128)	in	order	to	cover	tracks.
THE	4	STAGES	OF	THE	ATTACK
3
Lateral	Movement	attempts	
(using	Credentials:	This	can	
impact	even	patched	
systems,	as	it	did	in	Petya /	
NotPetya)
2
Credential	Theft	
(Browser	History,	Browser	
Credentials	and	Windows	
Credentials)
1
Exploitation	and	
Injection	using	
Eternal	Blue	/	
Double	Pulsar
4
Ransomware	
(All	else	fails,	cover	
tracks)
VISIBILITY
• Here,	visibility	of	the	attack	was	critical.	IDT	leveraged	an	
EDR	tool,	which	we	have	deployed	throughout	our	
environment,	both	at	Amazon	and	within	the	Enterprise.
• EDR	records	all	events	on	the	endpoints,	including	file	
activity	changes,	network	connections,	registry	
modifications,	process	injection,	and	authentication	
activity.
• It	is	critical	to	record	events	because	we	can	never	be	
certain	that	our	defenses	will	be	100%	effective
• We	don’t	know	ahead	of	time	what	will	become	
important	for	analysis,	and	future	defense	so	we	record	
all	events.
• History	is	streamed	live	into	a	Hardened	Amazon	instance	
for	analytics	and	secure	offline	storage.
MINIMIZING	THE	RISK
• Record	Everything	on	the	Endpoints
• Understand	Attack	Patterns	and	Methods
• Improve	Detection,	Prevention	and	Response
• Create	alerts	for	exploits	and	behaviors	(including	NSA	exploit	tools)
• Immediate	Isolation	of	impacted	hosts	(real-time)
UNDERSTANDING	THE	DATA
• IDT	worked	with	over	a	several	dozen	researchers	before	coming	to	a	deep	understanding	of	the	activity	
that	took	place.
• IDT	understood	that	this	activity	was	one	of	the	first	hit	with	this	attack	and	most	of	the	IP	addresses	
involved	in	the	attack	were	not	yet	registered	on	any	threat	intelligence	feed	after	speaking	to	dozens	
more.
• IDT	shared	the	information	of	the	attack	directly	with	its	Security	Vendors	and	Service	Providers	in	order	
to	bring	additional	visibility	to	the	issue.
• IDT	felt	that	this	method	of	attack	would	become	wide-spread,	and	in	short	order,	WannaCry,	Petya and	
Not-Petya variants	leveraged	similar	tools	and	capabilities	throughout	the	world.
CLOUD	SECURITY;	HOW	IT	IS	DIFFERENT	– BETTER
• Software	Defined	Networking	and	Software	Defined	Security	– allows	you	to	effect	changes	in	the	
environment	within	seconds	via	API	Integrations,	Orchestration	and	Automation.
• Configuration	Auditing	Tools	that	examine	configurations	directly.
• Cloud	Security	vendors	keep	software	updated	for	you,	lowering	requirements	around	management	
and	software	update	lifecycles.
WHAT	WAS	LIFE	LIKE	PRIOR	TO	SECURITY	
AUTOMATION?
• SIEM	Correlation	- Minutes
• Initiate	investigation	- Minutes
• Contain	- Minutes	
• Search,	Investigate,	Pivot	– Minutes	/	Hours
• Building	context	- Minutes	/	Hours
• Triage	- Minutes	/	Hours	/	Days
• Remediation	- Minutes	/	Hours	/	Days
• Reports	and	Auditing	– Hours	/	Days
• Learns	from	Events	/	Incident	and	Improves	Logic	- Hours	/	Days
FOLLOWING	TIGHT	INTEGRATION	USING	AUTOMATION
• Initiate	automated	investigation	from	alert	received	– Seconds
(Splunk +	WildFire)
• Automatic	Containment	– Seconds
(Hexadite	+	Palo	Alto	+	AWS)
• Automated	Search,	Investigate,	Pivot	– Seconds	/	Minutes
(Splunk Splunk and Splunk again)
• Automated	Building	of	context	- Seconds	/	Minutes
(Hexadite	+	Secdo +	Splunk)
• Automated	Triage	- Seconds	/	Minutes
(Splunk +	Hexadite	)
• Automated	Remediation	– Seconds
(Hexadite	+	Splunk +	Palo	Alto	+	Secdo +	AWS)	
• Automated	Reports	generation	and	full	audit	trail	– Seconds
(Hexadite	+	Splunk)
• Automated	Iterative	Improvement	from	prior	Events	/	Incident	and	Improves	Logic	- Seconds	
(Hexadite)
TRADITIONAL	VS.	AUTOMATED	IR
Traditional IR
Automated IR
Min. Hr. Hr. or Days
Sec. Min. Sec.
Mean Time to Initiate
Mean Time to Validate
Mean Time to Contain
TRADITIONAL	(MANUAL)	IR Total Time
9 Hours
WildFire Alert
Received in SIEM
Locate the
Downloaded File
Analyze Suspicious
Host’s Processes
Analyze Persistency
Methods
10 Min. 32 Min. 3.5 Hr. 8.0 Hr.
14 Min. 1.2 Hr. +Days
Follow Leads
Isolate Suspicious
Host Manually
Find Evidence for
File Execution
Initiate Forensics
Imaging
2 Hr.
2.3 Hr.
Analyze Splunk
for Network Activity
7.0 Hr.
Analyze Recently
Created Files
8.5 Hr.
Analyze Drivers
And Services
Generate
Leads
9.0 Hr.
Total Time
1.5 Minutes
Splunk Receives
WILDFIRE Alert
Search Host for Malicious
Activity
Collect Open Connections
Generate
Leads
Analyze All Running
Processes
Analyze Installed Services
and Drivers
Analyze Recently
Created Files
Analyze Persistency Methods
Analyze Network Logs
Analyze Authentication Logs
1 Sec.
18 Sec.
49 Sec.
1.5 Min.
7 Sec.
24 Sec.
+Min.
Follow Leads
Isolate Suspicious
Host with Palo Alto App
Terminate
Process
1.3 Min.
Alert User about his Host
being Investigated
Analyze WildFire Behavioral
Report via WF API
Search Behavioral Report
within Suspicious Host
Quarantine
Files
Collect Running Processes
Collect Recently Created Files
Collect Persistency Methods
Collect Authentication Logs
Collect Network Logs
Automated IR
TAKEAWAYS
• Visibility	and	Speed	to	Resolution	is	Key
• Security	Automation	is	Achievable
• Automation	is	the	only	way	we	can	stay	ahead	of	the	emerging	threat	landscape

Mais conteúdo relacionado

Semelhante a Lessons Learned from an Attack the World Was Not Ready For: Achieving Security Automation

Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....zayadeen2003
 
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Adam Thierer
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19Emile Sayegh
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 

Semelhante a Lessons Learned from an Attack the World Was Not Ready For: Achieving Security Automation (20)

Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Munk and vc
Munk and vcMunk and vc
Munk and vc
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
New Media_Israel Export Institute
New Media_Israel Export InstituteNew Media_Israel Export Institute
New Media_Israel Export Institute
 
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Pluribus vc hgs mkt overview
Pluribus vc hgs mkt overviewPluribus vc hgs mkt overview
Pluribus vc hgs mkt overview
 
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Lessons Learned from an Attack the World Was Not Ready For: Achieving Security Automation