Nov. 28, 2023, 11:25 p.m. | SANS Cloud Security

SANS Cloud Security www.youtube.com

In this talk, we will discuss the numerous ways attackers can steal data from Google Cloud Platform (GCP) resources with minimal chance of detection. It explores five different methods an attacker can use to exfiltrate data in the popular services: Google Cloud Storage, Cloud SQL and BigQuery. For each method we will describe the generated log events and what to look for to detect malicious behavior. We will finish with a summary of the key takeaways and next steps for …

attacker attackers beyond cloud cloud platform cloud sql cloud storage data data exfiltration detection discuss exfiltrate data exfiltration gcp google google cloud google cloud platform hidden perimeter platform popular resources services sql steal storage threat

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer

@ Commit | San Francisco

Trainee (m/w/d) Security Engineering CTO Taskforce Team

@ CHECK24 | Berlin, Germany

Security Engineer

@ EY | Nicosia, CY, 1087

Information System Security Officer (ISSO) Level 3-COMM Job#455

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Application Security Engineer

@ Wise | London, United Kingdom