Megan Roddie-Fonseca
Certified Instructor CandidateSenior Security Engineer at Datadog
Specialities
Cloud Security, Digital Forensics and Incident Response
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCloud Security, Digital Forensics and Incident Response
Megan Roddie-Fonseca currently works as a Senior Security Engineer at Datadog. She is also a co-author of FOR509: Enterprise Cloud Forensics and Incident Response and a frequent presenter at security conferences. In addition to her technical expertise, Megan serves as the CFO of Mental Health Hackers, advocating for mental wellness within the industry. She holds two Master’s degrees—one in Digital Forensics and the other in Information Security Engineering—along with several industry certifications that span a wide range of specialties.
Megan is passionate about providing students with practical, hands-on training that mirrors real-world challenges, enabling them to tackle incidents with confidence. Outside of her work, she’s a fierce competitor in Muay Thai and Brazilian Jiu-Jitsu, bringing the same tenacity to her sport as she does fighting cybercrime.
Explore content featuring this instructor’s insights and expertise.
As more and more organizations begin moving their resources to the cloud, analysts and responders must be prepared to operate in this new landscape. One aspect of traditional forensics that we must learn to implement in the cloud is memory forensics.
Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically?There are many pathways that threat actors utilize to gain access to cloud resources. Among these are endpoints that contain various cloud credential material.This cloud credential material - in the form of various files, tokens and cookies is often overlooked, with little visibility and telemetry generated.
As cloud migration and modernization gain momentum in 2023, organizations are increasingly leveraging cloud technologies to enhance operational efficiency and improve application performance. However, many encounter a discrepancy between their anticipated cloud outcomes and the reality they face. A significant barrier preventing organizations from realizing the full benefits of the cloud is the absence of DevSecOps practices.
In today's rapidly evolving cyber landscape, attacks are becoming more sophisticated and frequent, making robust detection and response capabilities critical for every organization. Join us for the Detection & Response Track at the Fall Cyber Solutions Fest, where you'll discover the strategies, tools, and insights that will empower your organization to stay ahead.Whether you're looking to fine-tune your current operations or completely overhaul your approach, this session will equip you with actionable insights from top top industry experts. What to Expect:Building Detection Engineering Into Security OperationsReducing Detection and Response TimesHow EDR and XDR Solutions Can Help Organizations with Detection and ResponseAutomating Incident Response Leveraging Lessons from Response to Inform Detection
Part 1: Building a Cloud Security Strategy: A Step-by-Step GuideIn this session, SANS Institute experts will guide you through the key steps in developing a robust cloud security strategy. Whether you're just starting or looking to strengthen your approach, this webcast covers everything from understanding your cloud environment to building a threat detection program and preparing for incident response.
This hands-on workshop will support content from FOR509: Enterprise Cloud Forensics and Incident Response
Historically, analysts have relied on experts with specialized training to acquire and analyze forensic data. With the power of automated investigation, Binalyze’s AIR platform reduces the overhead of forensic investigations by automating the process of collecting artifacts, triaging the data, and identifying next steps. In this webinar, we will demonstrate how with the right tooling, analysts of all backgrounds can effectively handle incidents, reducing the response time by removing the need for frequent escalation.
The ability to swiftly detect, investigate, and respond to cyber threats is crucial for minimizing damage. The Detection & Response track focuses on best practices, tools, and techniques for building robust threat detection and incident response capabilities.
Secure the Future: Practical Solutions for Tomorrow’s Cyber ThreatsJoin us for the Emerging Threats Summit Solutions Track for a unique, forward-looking virtual event focused not just on identifying emerging cybersecurity threats—but on tackling them head-on.Rather than speculating, we’ve invited leading experts who are actively shaping the future of cybersecurity to share real-world insights and actionable strategies. From AI and ICS/OT vulnerabilities to the implications of quantum computing, this event is designed to equip you with proactive, solution-driven approaches to stay ahead of the evolving threat landscape.You’ll gain access to:Expert-Led Sessions exploring high-impact threat areas and what they mean for your organization.Interactive Discussions focused on building practical frameworks, advancing workforce education, and shaping policy and regulation.Collaborative Insights that connect research with real-world application so you can act, not react.If you're responsible for securing systems, developing strategies, or building resilience into your organization, this summit is your opportunity to future-proof your defenses—before tomorrow’s threats become today’s realities.Reserve your spot and help shape the response to cybersecurity’s next big challenges.
Review relevant educational resources made with contribution from this instructor.