Closing Doors: Finding Misconfigurations with Configuration Compliance

Logo
Presented by

Andrea Castillo, Crossfuze | Kevin Urbanek, Crossfuze |Anderson Ferneyhough, Crossfuze

About this talk

What if you were focused on the external threat landscape (DoS, malware, phishing) while there was an internal threat you didn’t know about? What if, despite your efforts to protect against outsiders, you were still leaving doors open for them? Misconfiguration has become an increasingly popular avenue for hackers to access your organization’s infrastructure. In the 2020 Data Breach Investigation Report by Verizon, misconfiguration surpassed ransomware as a leading cause of data breaches. Join us for an overview of the threat posed by misconfiguration and how Configuration Compliance can: • link security standards (i.e. HIPAA, CIS Benchmarks, Microsoft Security Compliance) with scanner results and identify failed tests • auto-assign remediation tasks to relevant support teams • integrate with existing change management processes Andrea Castillo, CISSP, Practice Director, Risk & Security, Crossfuze Kevin Urbanek, Technical Architect, Risk & Security, Crossfuze Anderson Ferneyhough, Masters in Cyber Security, Technical Consultant, Crossfuze
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (95)
Subscribers (3270)
Transform your security operations the same way you are transforming your business with automation, AI, context, and collaboration between security, IT, and risk teams. You can identify, prioritize, and respond with agility to evolving cyber threats. We can also help you get proactive to improve your security by systematically hardening and reducing your digital attack surface and optimizing and orchestrating your security operations.