Fred Meek, Enterprise Solutions Engineering Manager, Wiz
About this talk
Security breaches in the cloud rarely exploit a single misconfiguration or vulnerability. Instead, it is a multitude of issues that when taken in isolation wouldn’t raise a red flag but together make a toxic combination that represents real risk.
In this session, discover five common toxic combinations across internet exposure, identities and entitlements, software vulnerabilities, and misconfigurations and how combined represent an attacker pathway to a breach. You will also learn:
• What contributes to cloud complexity
• Examples of high-risk toxic combinations
• How to focus on the risks that matter
Presented by Fred Meek, Solutions Engineering Manager, this promises to be an insightful and informative session.
Learn how organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, and Kubernetes so they can build faster and more securely.…