SlideShare a Scribd company logo
SECURITY
IMPLICATIONS
OF THE CLOUD.
Michael Stoeger
Vice President Sales, Alert Logic
5
47
74
89
184
289
277
222
207
571
Denial of Service
Crimeware
Physical Theft / Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Web App Attacks
Security risk is shifting to unprotected web applications
Web app attacks are now the
#1 source of data breaches
But less than 5% of data center security
budgets are spent on app security
Source: Verizon DBIR 2017
n= 1,935
UP 300% SINCE 2014
$23 to $1
Percentage of Breaches
10% 20% 30%
Source: Gartner
Web App Attacks
Vulnerabilities
+ Change
+ Shortage
Complexity of defending web applications and workloads
Risks are moving up the stack
1. Wide range of attacks at every
layer of the stack
2. Rapidly changing codebase can
introduces unknown vulnerabilities
3. Long tail of exposures inherited
from 3rd party development tools
4. Extreme shortage of cloud and
application security expertise
Web App
Attacks
OWASP
Top 10
Platform /
Library
Attacks
System /
Network
Attacks
Perimeter & end-point security tools
fail to protect cloud attack surface
Web Apps
Server-side Apps
App Frameworks
Dev Platforms
Server OS
Hypervisor
Databases
Networking
Cloud Management
Tame the Beast
Industry Challenge: The Good, the Bad and the Ugly
Known Good
Known Bad
Suspicious
Allow
Identify | Tune | Permit
Block
Drop | Reconfigure
Application Stack
Web Apps
Server-side Apps
App Frameworks
Dev Platforms
Databases
Server OS
Hypervisor
Hardware Classification Action
HUMAN EXPERT
REQUIRED
CASE
ILLUSTRATION
Customer X – Data Exfiltration
Company Profile
Textile Industry
$65M Annual Revenue
500+ Employees
4 Branch Offices (NA)
IT Dedicated Headcount – 14
Security Dedicated Headcount –
2
Hybrid Data Center (AWS &
CoLo)
Customer X – Data Exfiltration
Company Profile
Textile Industry
$65M Annual Revenue
500+ Employees
4 Branch Offices (NA)
IT Dedicated Headcount – 14
Security Dedicated Headcount –
2
Hybrid Data Center (AWS &
CoLo)
Attack Progression
Stalked company on LinkedIn and Google
Gained entry through PHP (KNOWN) flaws
Replaced PHP login to capture credentials
Leveraged credentials to access critical
system
Stole Financial, Design data & Roadmap
Undetected for 4 months – FBI
Notification
Cost of Breech - $1.8M
Thank You.

More Related Content

PDF
CSS Trivia
PDF
The Intersection of Security & DevOps
PDF
Security Implications of the Cloud
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PPTX
Esteban Próspero
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
CSS Trivia
The Intersection of Security & DevOps
Security Implications of the Cloud
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Esteban Próspero
Advanced Threat Protection – ultimátní bezpečnostní řešení

What's hot (20)

PDF
The Cost of Inactivity: Malware Infographic
PPTX
Solnet dev secops meetup
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
Next Dimension and Cisco | Solutions for PIPEDA Compliance
PDF
Advanced Threat Defense Intel Security
PPTX
Cisco Web and Email Security Overview
PDF
Cyber Kill Chain Deck for General Audience
PDF
Web Application Penetration Testing
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PPTX
Understanding Application Threat Modelling & Architecture
PPTX
#ALSummit: Live Cyber Hack Demonstration
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Threats, Threat Modeling and Analysis
PPTX
FireEye Engineering
PDF
Revolutionizing Advanced Threat Protection
PPTX
Ethical Hacking & Penetration Testing
PPT
Networking and penetration testing
PDF
Chapter 1, Transformasi antivirus
PDF
The Intersection of Security and DevOps
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
The Cost of Inactivity: Malware Infographic
Solnet dev secops meetup
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Advanced Threat Defense Intel Security
Cisco Web and Email Security Overview
Cyber Kill Chain Deck for General Audience
Web Application Penetration Testing
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Understanding Application Threat Modelling & Architecture
#ALSummit: Live Cyber Hack Demonstration
Advanced Threat Protection - Sandboxing 101
Threats, Threat Modeling and Analysis
FireEye Engineering
Revolutionizing Advanced Threat Protection
Ethical Hacking & Penetration Testing
Networking and penetration testing
Chapter 1, Transformasi antivirus
The Intersection of Security and DevOps
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Ad

Similar to Security Implications of the Cloud - CSS ATX 2017 (20)

PDF
Security Implications of the Cloud
PDF
Security Implications of the Cloud - CSS Dallas Azure
PDF
Security Implications of the Cloud
PDF
Security Implications of the Cloud
PDF
6 major cyber security risks to cloud computing
PDF
Cloud Application Security Best Practices To follow.pdf
PDF
The Top 5 Risks of Cloud Migration
PPTX
FireHost Webinar: Protect Your Application With Intelligent Security
PDF
Cloud Application Security Best Practices To follow.pdf
PPT
Cloud Computing Security Needs & Problems Alon Refaeli
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Cloud_security.pptx
PDF
Web App Security: Top Threats and How to Protect Your App.pdf
PPTX
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
PDF
Realities of Security in the Cloud
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
The Top Cloud Security Issues
PDF
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
PPTX
Application security from cloud computing
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
Security Implications of the Cloud
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud
Security Implications of the Cloud
6 major cyber security risks to cloud computing
Cloud Application Security Best Practices To follow.pdf
The Top 5 Risks of Cloud Migration
FireHost Webinar: Protect Your Application With Intelligent Security
Cloud Application Security Best Practices To follow.pdf
Cloud Computing Security Needs & Problems Alon Refaeli
Journey to the Cloud: Securing Your AWS Applications - April 2015
Cloud_security.pptx
Web App Security: Top Threats and How to Protect Your App.pdf
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
Realities of Security in the Cloud
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Top Cloud Security Issues
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Application security from cloud computing
CSS17: Atlanta - Realities of Security in the Cloud
Ad

More from Alert Logic (20)

PDF
Managed Threat Detection & Response for AWS Applications
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Reducing Your Attack Surface
PDF
Reality Check: Security in the Cloud
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Rent-A-Center
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
Security Spotlight: The Coca Cola Company
PDF
The AWS Shared Responsibility Model in Practice
Managed Threat Detection & Response for AWS Applications
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
Reducing Your Attack Surface
Reality Check: Security in the Cloud
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Rent-A-Center
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
The Intersection of Security & DevOps
Security Spotlight: Presidio
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
Security Spotlight: The Coca Cola Company
The AWS Shared Responsibility Model in Practice

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction

Security Implications of the Cloud - CSS ATX 2017

  • 1. SECURITY IMPLICATIONS OF THE CLOUD. Michael Stoeger Vice President Sales, Alert Logic
  • 2. 5 47 74 89 184 289 277 222 207 571 Denial of Service Crimeware Physical Theft / Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Web App Attacks Security risk is shifting to unprotected web applications Web app attacks are now the #1 source of data breaches But less than 5% of data center security budgets are spent on app security Source: Verizon DBIR 2017 n= 1,935 UP 300% SINCE 2014 $23 to $1 Percentage of Breaches 10% 20% 30% Source: Gartner Web App Attacks
  • 3. Vulnerabilities + Change + Shortage Complexity of defending web applications and workloads Risks are moving up the stack 1. Wide range of attacks at every layer of the stack 2. Rapidly changing codebase can introduces unknown vulnerabilities 3. Long tail of exposures inherited from 3rd party development tools 4. Extreme shortage of cloud and application security expertise Web App Attacks OWASP Top 10 Platform / Library Attacks System / Network Attacks Perimeter & end-point security tools fail to protect cloud attack surface Web Apps Server-side Apps App Frameworks Dev Platforms Server OS Hypervisor Databases Networking Cloud Management
  • 4. Tame the Beast Industry Challenge: The Good, the Bad and the Ugly Known Good Known Bad Suspicious Allow Identify | Tune | Permit Block Drop | Reconfigure Application Stack Web Apps Server-side Apps App Frameworks Dev Platforms Databases Server OS Hypervisor Hardware Classification Action HUMAN EXPERT REQUIRED
  • 6. Customer X – Data Exfiltration Company Profile Textile Industry $65M Annual Revenue 500+ Employees 4 Branch Offices (NA) IT Dedicated Headcount – 14 Security Dedicated Headcount – 2 Hybrid Data Center (AWS & CoLo)
  • 7. Customer X – Data Exfiltration Company Profile Textile Industry $65M Annual Revenue 500+ Employees 4 Branch Offices (NA) IT Dedicated Headcount – 14 Security Dedicated Headcount – 2 Hybrid Data Center (AWS & CoLo) Attack Progression Stalked company on LinkedIn and Google Gained entry through PHP (KNOWN) flaws Replaced PHP login to capture credentials Leveraged credentials to access critical system Stole Financial, Design data & Roadmap Undetected for 4 months – FBI Notification Cost of Breech - $1.8M