Help Secure Your Aws Workloads with Crowdstrike Feat Roper Tech Sec205

Title

AWS re:Invent 2023 - Help secure your AWS workloads with CrowdStrike, feat. Roper Tech (SEC205)

Summary

  • Rob Solomon from CrowdStrike discusses the cloud threat landscape, security challenges, and solutions.
  • CrowdStrike simplifies cloud security by consolidating it under a single platform and automating deployment through AWS service integrations.
  • Corinne Tibbult from Roper Technologies shares their experience with CrowdStrike.
  • Key drivers for cloud migration include operational relief, agility, cost-effectiveness, and the ability to scale.
  • Cloud security challenges include lack of visibility, cloud complexity, operational friction, runtime threats, and skill shortages.
  • CrowdStrike uses a lightweight sensor and cloud API control plane to collect telemetry and process it using machine learning models.
  • The Falcon platform integrates various security modules based on the collected data.
  • Falcon Cloud Security suite addresses pre-runtime, runtime, and agentless API security.
  • CrowdStrike has built integrations with AWS services, including Control Tower and SSM, to simplify deployment and management.
  • Corinne Tibbult discusses Roper's cybersecurity strategy and their successful use of CrowdStrike, including during a cyber event.
  • Key takeaways include the importance of automating deployment, practicing defense in depth, choosing the right tools, and using managed services.

Insights

  • The increasing sophistication and speed of adversaries in the cloud environment highlight the need for advanced security solutions that can keep pace.
  • CrowdStrike's approach to cloud security emphasizes the importance of data analysis and real-time threat detection to counteract the rapid breakout times of attacks.
  • The integration of CrowdStrike with AWS services like Control Tower and SSM demonstrates a trend towards simplifying security management in complex cloud environments.
  • Roper Technologies' experience with CrowdStrike underscores the value of a centralized security strategy, even in a decentralized company structure.
  • The discussion on the total cost of ownership and the benefits of managed services reflects a broader industry recognition of the need to balance security investments with operational efficiency.
  • The session suggests a growing partnership between cloud service providers and security vendors to offer comprehensive solutions that address the multifaceted challenges of cloud security.