Nice presentation with direct to-the-point facts finishing up with an actionable approach on how to start. I wasn't aware previously of tracked and untracked connections.
Great presentation, thanks. Quick question, did we really contained the instance here? I see we allow malware to communicate with Cnc with Isolation subnet. Exfiltration is still possible, isn’t it?
Excellent
Nice presentation with direct to-the-point facts finishing up with an actionable approach on how to start. I wasn't aware previously of tracked and untracked connections.
It's really good to know Pros/Cons for different network layers. Thank you for your presentation.
Awesome presentation. Thank you very much for explainaing the containment techniques can be used in AWS!
Great stuff! First time I had to lower the playback speed though. :D
Great presentation, thanks.
Quick question, did we really contained the instance here? I see we allow malware to communicate with Cnc with Isolation subnet. Exfiltration is still possible, isn’t it?