Cloud security is a software engineering problem - not a traditional security problem. This talk will demonstrate an advanced cloud misconfiguration exploit to understand how to protect against such attacks using architecture best practices.
The cloud changed the way hackers operate: Rather than targeting an organization and then searching for vulnerabilities to exploit, they now use automation to scan the internet looking for cloud misconfigurations to exploit, and then use IAM like a network to move laterally, find data, and extract it. We’ve graduated from simple misconfiguration mistakes to techniques bad actors are using today to breach data out from under the most advanced cloud security teams—often without detection.
Priority access to all content
Exclusive promotions and giveaways