Episode 9: Challenges With Cloud Management Logs
Attendees Guest: Shira Shamban Guest title: Cloud Security Company: Check Point (Dome9) Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them. Abstract Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them. 0:00 Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) 11:55 Introducing the challenges of cloud log management: enabling correctly, long term storage, analysis challenges, lack of info 19.45 The challenges of monitoring cloud assets using IP addresses 21:25 How to properly do cloud based log collection: Enrichment, external threat service 24.20 Values of log visualization 28.05 Log storage management 31:21 Summary and last words
Episode 9 of the SilverLining IL podcast, hosted by MarkeTech Group, titled "Episode 9: Challenges With Cloud Management Logs" was published on October 29, 2019 and runs 35 minutes.
October 29, 2019 ·35m · SilverLining IL
Summary
Attendees Guest: Shira Shamban Guest title: Cloud Security Company: Check Point (Dome9) Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them. Abstract Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them. 0:00 Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) 11:55 Introducing the challenges of cloud log management: enabling correctly, long term storage, analysis challenges, lack of info 19.45 The challenges of monitoring cloud assets using IP addresses 21:25 How to properly do cloud based log collection: Enrichment, external threat service 24.20 Values of log visualization 28.05 Log storage management 31:21 Summary and last words
Episode Description
Attendees
Guest: Shira Shamban
Guest title: Cloud Security
Company: Check Point (Dome9)
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
Abstract
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
|
0:00 |
Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) |
|
11:55 |
Introducing the challenges of cloud log management: enabling correctly, long term storage, analysis challenges, lack of info |
|
19.45 |
The challenges of monitoring cloud assets using IP addresses |
|
21:25 |
How to properly do cloud based log collection: Enrichment, external threat service |
|
24.20 |
Values of log visualization |
|
28.05 |
Log storage management |
|
31:21 |
Summary and last words |
Similar Episodes
Apr 1, 2026 ·50m
Mar 18, 2026 ·50m
Mar 11, 2026 ·42m
Mar 4, 2026 ·64m