Cloud Security Masterclass: Thinking Like a Cloud Hacker Part 1

Logo
Presented by

Josh Stella, Co-Founder and CTO of Fugue

About this talk

To keep your cloud infrastructure secure from hackers, you have to start thinking like one. Today’s attackers have a vast toolbox for stealing your cloud-based data. Automation can find gaps in your security posture that provide access to your environment. And cloud misconfigurations can enable them to find and extract data—often without detection. And don’t expect compliance rules to flag these for you, because they often don’t. It’s time you started looking at your cloud environment from a fresh perspective — that of a hacker who’s out to exploit vulnerabilities you aren’t aware of. In this Cloud Security Masterclass, Fugue CTO Josh Stella helps you get into the mindset of an attacker probing your cloud environment. You’ll learn how to spot previously-missed vulnerabilities and determine the blast radius of your cloud security gaps.

Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (19)
Subscribers (798)
Cloud computing has turned security on its head. The cloud attack surface is the configuration of thousands of interrelated resources — and it’s all changing constantly. Ensuring continuous cloud security and compliance requires a deep understanding how cloud works and the nature of misconfiguration. Why it happens, how hackers exploit it, and how to prevent it. At Fugue, we’re committed to helping cloud professionals master the concepts they need to ensure the security of their cloud infrastructure. Our Cloud Security Masterclass series is led by Fugue CTO and co-founder Josh Stella, who has extensive experience with cloud security and working with national security customers as a Principal Solutions Architect with AWS. He takes us on technical deep dives into critical cloud infrastructure security concepts. Fugue helps cloud teams transform how they do cloud security at every stage of the software development lifecycle — so they can move faster in the cloud without breaking the rules that put data at risk.