[On-Demand Webinar] Live Simulation of an Advanced Cloud Misconfiguration Exploit

Recent high-profile cloud breaches involve advanced tactics that took advantage of multiple resource misconfigurations to gain entry to environments, discover resources, move laterally, and extract data—all without detection. They don’t typically break compliance rules, and security teams won’t likely recognize them as vulnerabilities.

Join Josh Stella, co-founder and CTO of Fugue, as he conducts a live simulation of one such attack to demonstrate how malicious actors leverage your cloud services against you—so you can learn how to protect your environment and sensitive data. Specifically, Josh will show:

  • How bad actors exploit common cloud resource misconfigurations, including IAM, EC2, and S3
  • How to evaluate your cloud environment for similar misconfiguration vulnerabilities
  • Free and open source tools that empower engineers to improve your cloud security posture



Watch This Simulation

I’m seeing a lot of cloud configuration errors in the real world —and it’s scaring the hell out of me.

David Linthicum Chief Cloud Strategy Officer, Deloitte Consulting

david-l