Recent high-profile cloud breaches involve advanced tactics that took advantage of multiple resource misconfigurations to gain entry to environments, discover resources, move laterally, and extract data—all without detection. They don’t typically break compliance rules, and security teams won’t likely recognize them as vulnerabilities.
Join Josh Stella, co-founder and CTO of Fugue, as he conducts a live simulation of one such attack to demonstrate how malicious actors leverage your cloud services against you—so you can learn how to protect your environment and sensitive data. Specifically, Josh will show:
I’m seeing a lot of cloud configuration errors in the real world —and it’s scaring the hell out of me.
David Linthicum Chief Cloud Strategy Officer, Deloitte Consulting