Learn more about securing your Azure environment here: http://bit.ly/azure-security-versprite
Tapping the power of various inherent cloud monitoring and log components in order to build a dynamic threat library that can substantiate your threat model is very possible. In this presentation, we look at both Azure and AWS components to leverage when adding threat context and ultimately an amazing threat library to your application threat model. We also look at exemplifying these techniques across mission critical infrastructure in Energy and Transportation.