Misconfigured cloud resources can empower malicious insiders with the ability to do real damage to your organization. Ill-intentioned employees and contractors have an added advantage over outsiders: better means of discovering, accessing, and exploiting cloud resources.
Join Josh Stella, co-founder & CTO of Fugue, and Wayne Crissman, Director of Security at Fugue, as they conduct a live simulation of how malicious insiders exploit common cloud misconfigurations to conduct:
- Data exfiltration
- Infrastructure vandalism
- Cryptomining and resource misuse
They will also show how common insider negligence can expose cloud resources and data to exploitation.