InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Turn Alert Fatigue into Meaningful Risks with Cyber Asset Relationship Graphs

Presented by

Jasmine Henry, Field Security Director and Akash Ganapathi, Director of Solutions Architecture, JupiterOne

About this talk

Cloud security is noisy - our research shows the average organization has a backlog of over 219,000 findings from cloud security posture management and vulnerability scanning tools. Yet, despite the volume of data, security operations teams struggle to answer even simple questions about open source vulnerabilities or event triggers. Learn why cloud attack surface management is much simpler with cyber asset and relationship graphs. We’ll dive into how cloud asset relationships reveal the unique toxic combinations of misconfiguration and access, giving teams the context to distinguish between false positives and true risk. Join us to learn: • How to create better asset relationship graph visibility by integrating your cloud assets and security stack • How to query relationships between users, access, owners, and developer relationships to facilitate deeper inquiry of assets • Why context is key to turning findings into actionable intelligence about your most critical risks • How to scale and automate asset, vulnerability, and attack surface management practices for cloud-native environments
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80458 subscribers1015 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics