Underestimated Risk: Common Cloud and DevOps Misconfigurations

Presented by


About this talk

The goal of the Attack & Defend series is to inform organizations about current threats in an engaging way, while arming participants with best practices to reduce risk. For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We simulate a head-to-head battle. In this session, we demo some of the most common misconfigurations in Cloud and DevOps environments that attackers can exploit and show you how to effectively mitigate risk. Zero-days grab headlines, but an attacker is more likely to use one of the exploits we demonstrate.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (44)
Subscribers (4167)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.