Identifying the Risk of a Lateral Movement Attack in Your Cloud

Presented by

Orca Security

About this talk

To mitigate the risk of a lateral movement attack, monitor for private keys and passwords in shell history. Attackers can use these to move laterally across your environment. Orca Security scans your entire cloud account in a holistic manner. It peers into each machine’s filesystem for private keys, such as on server A, taking a hash of each found. It then checks the authorized key configuration across all other assets for public keys. Watch and learn more.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (22)
Subscribers (1007)
See how leading enterprises and cloud-first companies detect risks in public cloud environments such as AWS, Microsoft Azure, and Google Cloud Platform.