Cloud threat hunting is critical for proactively detecting and mitigating attacks on cloud and hybrid environments. Hackers leverage orchestration attacks, file synchronization poisoning, cross-tenant attacks, credential stuffing, and flaws in underlying architecture.
In this interview with BlackBerry host Matt Stephenson, Sherri Davidoff walks us through it all…
About Sheri Davidoff
Sherri Davidoff (@sherridavidoff) is the CEO of LMG Security and the author of Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, Davidoff has been called a “security badass” by the New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC and many more.
Davidoff is an instructor for Black Hat, and the co-author of Network Forensics: Tracking Hackers through Cyberspace. She is also a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and holds her degree in computer science and electrical engineering from MIT.
She has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called Alien.