As organizations rapidly move human and machine access and workloads to the Cloud, scale and efficiency are at an all time high. With this exponential increase of scale, attackers are taking advantage of the lack of visibility and over-permissioning that tends to occur as a result of the, often rapid, transformation.
In this session we’ll discuss tactics to discover and remediate privilege faux paus for the people and robots that need powerful access into your Cloud infrastructure.