Top Cloud Attack Paths You Should Worry About

Logo
Presented by

Brandon Traffanstedt, Global Director - Solutions Engineering, ‎CyberArk

About this talk

Security pros detail the common ways bad actors attack your cloud environments As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats. It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk. To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud. You will understand: - How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources - The danger of privileged credentials compromise in the cloud - Understand 3 to 4 of the most common cloud attack paths and potential mitigation tactics and tools - The role of cloud identities and permissions in the overall cloud security posture Join this webinar and learn how to combat bad actors in the cloud.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (904)
Subscribers (65205)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa