Cloud Attack Vectors: Build Cyber-Defense Strategies to Protect Cloud Resources

Logo
Presented by

Morey J. Haber, Brian Chappell, and Christopher Hills, BeyondTrust

About this talk

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus―it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, those pathways are increasingly abundant. Today’s attackers have realigned their efforts to capitalize, focusing on remaining undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches. In this session cybersecurity experts Morey J. Haber, Chief Security Officer, Brian Chappell, Chief Security Strategist, and Christopher Hills, Chief Security Strategist at BeyondTrust offer best practices for minimizing these new and increasingly exploited cloud attack vectors. Tune in to learn cutting edge strategies for building the optimal cloud defense for your organization’s unique cloud environment. What You’ll Learn: -Key definitions of modern cloud technologies, threats, and cybersecurity solutions -How entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment -How to implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments -How to develop models for documenting risk, compliance, and reporting based on your cloud implementation
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (903)
Subscribers (65145)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa