Cloudy with a Chance of Misconfiguration

Presented by

Bulut Ersavas, Senior Manager, Product Management, Rapid7 and Brandon Turner, Senior Director, Software Engineering, Rapid7

About this talk

Misconfigurations in the cloud are becoming a prevalent source of risk for organizations as more and more businesses move their infrastructure to the cloud. The root cause of this increased risk is that in a cloud environment, far more people can set up and deploy network infrastructure, whereas in an on-premises network, that ability is usually restricted to IT professionals who are well-versed in security best-practices. It’s important to note that while misconfigurations are a risk, they can be effectively managed. With the right tools and processes in place, you can leverage cloud infrastructure in a secure way. Correctly configuring cloud infrastructure requires close collaboration among development, IT, operations, and security teams. It also requires an understanding of proper configurations. As a result, scanning for vulnerabilities alone is not enough to manage risk in your cloud infrastructure—you also need a strategy to prevent misconfigurations, as well as a purpose-built way to detect them when they still manage to sneak their way through. Join Rapid7’s Bulut Ersavas, Senior Manager, Product Management and Brandon Turner, Senior Director, Software Engineering to learn about: -Common types of misconfigurations -How to discover misconfigurations -How to prevent misconfigurations -How to implement cloud security best practices

Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (435)
Subscribers (37286)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.