As more sensitive workloads and data continue to migrate to the cloud, cyber criminals and malicious actors are refocusing and sharpening their efforts to locate and attack them. Bad actors have discovered that they too can leverage the power of the cloud by compromising cloud applications and assets with malware and Trojans. After establishing a foothold, they use command and control servers to manipulate cloud applications and other resources to move laterally towards the most lucrative assets.
Join Orca Security’s Dror Zalman, Threat Research Team Leader, and Patrick Pushor, Principal Technical Evangelist as they discuss cloud security challenges and present best practices to protect against malware based compromise in an ever-moving infrastructure as a service environment.
Patrick is a serial startup technologist having played early and key roles in over six startups across four countries in the past 12 years including multiple cybersecurity and fintech companies. Previously, he worked as an independent consultant focused on infrastructure and integration projects in nearly every industry from national defense to agriculture. More recently, Patrick helped define the CSPM market as an early employee at Dome9 Security and is leveraging that experience at Orca Security to revolutionize how we think about and approach cloud workload protection.
Threat Research Team Lead
Orca's Threat Research Team Lead Dror Zalman's primary security experience is conducting offensive simulations and research in corporate networks and cloud environments. He brings hands-on experience in offensive and defensive cyber security expertise and has participated in multiple cybersecurity engagements in various industries including telecommunication, financial services, energy, industrial infrastructure, consumer goods and products, transportation, automobile, pharmaceuticals and municipal government.