Is my Cloud Pwned?

Presented by

Venkat Raghavan, Founder and CEO, Stack Identity & Dr. Prakash Shetty, Head of Product Strategy, Stack Identity

About this talk

What’s the definition of being Pwned? It’s a Slang. It’s derived from “owned,” which means to defeat or dominate, especially in a video or computer game. The proliferation of cloud-based infrastructures has revolutionized the way organizations operate, offering unparalleled scalability, accessibility, and flexibility. However, alongside these benefits, the ever-evolving threat landscape presents a pressing challenge: the identification and prevention of anomalous lateral movement within cloud environments. Attackers nowadays are looking for ways to own a cloud infrastructure so they can conduct various malicious activities ranging from hosting malware sites, crypto mining, data exfiltration, etc. They want to fly below the radar and continue the parasitic relationship with the business owners operating in public clouds. The attackers know that if they create any suspicious activity, they may be caught and stopped, but imagine a situation where there are “No Red Flags” and everything seems to be normal and they continue their malicious intent. Most of the time, businesses don’t realize that. their public cloud infrastructure is compromised by using shadow access to their and they continue to pay for it. This is where every business needs to monitor if they have been continuously pwned or can be pwned to take corrective actions to fix it.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65591)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa