Anatomy of Cloud Breaches and How to Prevent Them

Logo
Presented by

Fred Meek, Enterprise Solutions Engineering Manager, Wiz

About this talk

Security breaches in the cloud rarely exploit a single misconfiguration or vulnerability. Instead, it is a multitude of issues that when taken in isolation wouldn’t raise a red flag but together make a toxic combination that represents real risk. In this session, discover five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations and how combined represent an attacker pathway to a breach. You will also learn: • What contributes to cloud complexity • Examples of high-risk toxic combinations • How to focus on the risks that matter Presented by Fred Meek, Solutions Engineering Manager, this promises to be an insightful and informative session.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (9)
Subscribers (1094)
Learn how organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, and Kubernetes so they can build faster and more securely.