Breaking out of the container without Zero Day – Can that happen to me?
Asher Genachowski, Chen Cohen at Global AppSec Tel Aviv 2019
Organizations are in the process of changing and becoming more agile and to adopt DevOps as way of thinking. Many of them use Docker and Containers in order to implements those concepts in effective, Accurate and secure way. The changes from the traditional relationships between “System”, “Dev” and “Security” relationships into new relationships that Dev is actually doing the whole process include the “System” and “Security”, dramatically affect not only the internal IT infrastructure but the balance between the attacker and defenders. That change expose the organization to whole new security and cyber risks that seem to be solved years ago and revived with the new structure of the IT department.
Asher Genachowski
Security Senior Principal , Cyber Readiness & Audit Lead, Accenture
The speaker is senior manager at global management consulting and professional services firm that provides strategy, consulting, digital, technology and operations services and leading the Cyber Readiness and Purple Team services for that firm.
Chen Cohen
Linux Cyber Security consultant, Accenture
Chen Cohen is Linux Cyber Security consultant in Accenture cyber security readiness team. As part of his job Chen is working with major global companies in order to create and improve secure Linux & Unix environments include virtualization, cloud and more.
Asher Genachowski
Security Senior Principal , Cyber Readiness & Audit Lead, Accenture
The speaker is senior manager at global management consulting and professional services firm that provides strategy, consulting, digital, technology and operations services and leading the Cyber Readiness and Purple Team services for that firm.
Chen Cohen
Linux Cyber Security consultant, Accenture
Chen Cohen is Linux Cyber Security consultant in Accenture cyber security readiness team. As part of his job Chen is working with major global companies in order to create and improve secure Linux & Unix environments include virtualization, cloud and more.