O que é uma máquina virtual do azure?
O que é Check Point SandBlast?
Quem é a Twilio
Amazon Web Services (AWS)
Unlocking the Secrets of Key Management: O que é e qual a importância?
Security Cloud Management: CSPM – Postura de segurança em nuvem
Why the Best Cloud Pros Adopt a Cloud Access Security Broker?
Para que serve a Criptografia?
O que é Terraform e qual a sua importância?
/Articles
Unlocking the Secrets of Key Management: O que é e qual a importância?
Security Cloud Management: CSPM – Postura de segurança em nuvem
Why the Best Cloud Pros Adopt a Cloud Access Security Broker?
Por que os melhores profissionais de nuvem adotam um Cloud Access Security Broker?
Identity Access Management (IAM): O que é e qual sua importância?
/YouTube

Douglas Bernardini
Cybersecurity Specialist & Cloud Computing Expert with +10 years experience in IT infrastructure.
Specialist delivering assets for development teams in Google Cloud Platform (GCP) and Amazon web services (AWS)
Hands-on cloud security enterprise architect, with experience in SIEM/SOC, IAM, cryptography, pentest, network topologies, operating systems, databases, and applications.
Experience in DevSecOps analysis to discover vulnerabilities in software, identifying CI/CD risks gaps and recommending secure-coding process (S-SDLC).
/News
/Hubs
/Contact
/Member
/Certs
Cloud Security
/Risk Cloud Assessment

/Capabilities
Expert identifying and protecting sensitive data at scale. Manage complex, expensive, and time-consuming cloud workloads hardening process. Identify and alert sensitive data, such as personally identifiable information (PII).
Experience with highly available and fault-tolerant cloud enterprise protection against new and emerging cloud threats. Establish and enforce security to identify new cloud threats dynamically using next-generation technologies work with large data sets.
Provide technical guidance and coaching suspicious and malicious cloud activities in the cloud using native functionalities to identify suspicious behaviors from cloud resources and mitigating potential risks.
Collaborate with other professionals to determine functional and non-functional data privacy requirements for cloud considering IS0 27018. Ability to persuade and influence tech leaders to adopt data-privacy best approaches.
Robust knowledge in IAM cloud identity management. Experience in SoD, configuring cloud permissions in place to ensure that the right people have access to the right resources, considering identity-based policies in IAM, including users, groups, or roles
Reduce potential harm by effectively responding to security incidents. Quick, effective, and consistent responses to security incidents to reduce potential harm. Develop runbooks to create a library of incident response mechanisms.