The number one cause of cloud data breaches is infrastructure misconfiguration, whether due to human error or a lack of effective controls. Since engineers build and operate their cloud infrastructure, our Cloud Security Masterclass program is designed to help cloud engineers better understand cloud misconfiguration, why it occurs, and how malicious actors exploit it.
You’ll learn how to think more critically about the security of your unique use cases so you can identify and eliminate cloud misconfiguration vulnerabilities
What our Masterclass includes:
- A one-hour live video session
- Open chat and Q&A throughout
- Hands-on technical demonstrations
Get notified about future masterclass sessions!
Upcoming Cloud Security Masterclass Sessions
Previous Cloud Security Masterclass Sessions
Bringing Your Cloud Into Compliance and Proving It
Bringing an existing cloud environment into compliance and proving it to management and auditors is one of the most complex and daunting tasks for any engineering team. But with the right approach, you can bring your cloud into compliance faster, with less disruption, and fewer headaches.
Building a Highly Secure S3 Bucket Part I
In this cloud security masterclass, Josh Stella, Fugue CTO and co-founder, dive into the layers of S3 and how malicious actors are circumventing common security steps to extract data without detection.
Building a Highly Secure S3 Bucket Part II
Amazon S3 probably gets a lot of use at your company—it’s easy to use, reliable, and scalable.In this Cloud Security Masterclass, Fugue CTO Josh Stella digs deeper into three critical components of S3 security to help you think critically about security for your unique AWS use cases.
Locking Down the Security of AWS IAM
For enterprise cloud environments, AWS IAM security can become quite complex. Recent high-profile cloud-based data breaches have involved advanced cloud misconfiguration attacks exploit IAM misconfigurations that compliance controls and security professionals often miss.
A Conversation with Greg McCord (CalAmp)
The cloud is radically different from the data center, and keeping it secure requires thinking differently about the problem. Throw in Internet-of-Things (IoT), cloud-native architecture, and edge computing, and IT security can start to look downright alien to many.
A Live Chat with AWS/Red Ventures and Fugue
In this talk, James Huston (Red Ventures), Jon Myer (AWS), and Josh Stella (Fugue) discussed how cloud-native architectures that leverage AWS services such as Lambda and Step Functions can minimize your cloud attack surface, streamline security audits, and benefit your end customers.
Screaming at Security with Corey Quinn
“The only way to know everything you have running in AWS is to look at your AWS bill.” - Corey Quinn
If that’s the stuff of CFO nightmares, imagine the fear it strikes in the hearts of CISOs. If you aren’t aware it’s in your environment, how do you know it’s secure?