Nick Cheng has 16 years experience of cyber-security architecture design and implementation including Cloud Security Posture Management ( CSPM ), define and manage cloud security policy, cyber-security event monitoring and forensics, and also Secure Software Development Lifecycle ( SSDLC ).
This presentation will delve into the core concepts and functionalities of Google Cloud CNAPP solution (Security Command Center Enterprise), including:
Through this presentation, you will understand how Security Command Center Enterprise can help you:
This presentation focuses on the security scenarios of generative AI, analyzing its unique security challenges and protections. We will delve into the application scenarios of generative AI in various fields, from content generation and code development to data analysis, analyzing potential security risks such as prompt injection and jailbreaking.
In addition, we will share practical cases, demonstrating best practices for secure generative AI applications, and explore the importance of trustworthy AI, ensuring the fairness, transparency, and reliability of AI systems.
1. Traditional on-premises security protection strategies are no longer sufficient to handle the complexities of the cloud. Cloud environments are characterized by dynamic scaling, multi-tenancy, and other features that make security threats more difficult to predict and prevent.
2. The security responsibility model in the cloud environment is vastly different from that of on-premises. You need to understand the scope of the cloud provider's security responsibilities and deploy additional monitoring measures tailored to your own business needs. This presentation will analyze the key differences between the two to help you develop a more comprehensive security strategy.
3. The MITRE ATT&CK framework is an effective tool for understanding and classifying attacker behavior. We will introduce how to use the MITRE ATT&CK cloud matrix to identify potential threats in the cloud environment and strengthen defense measures.
4. Effective cloud security monitoring relies on comprehensive log data. The presentation will explore the major log types that need to be collected in the cloud environment, such as cloud service activity logs, virtual machine system logs, network traffic logs, etc., and explain how to analyze these logs to identify abnormal activities.
5. Establishing effective monitoring rules is the key to timely threat detection. We will share practical experience, explaining how to set monitoring rules and alert thresholds, and how to combine automated tools to improve the response speed of security incidents.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。