Weak Links in Cloud IAM - Never Trust. Always Verify!

Posted on in Presentations

Pen testers poke at misconfigured IAM policies, cloud users open their environments to attack, and attackers target IAM credentials while cryptojacking. Dive into how Identity impacts cloud environments from three different angles: a red team case study, alert analysis from thousands of accounts across three major CSPs, and how cryptojacking malware authors are targeting IAM credentials.

Dr. Chien-An (Jay) Chen

Speaker, Participant

Sr. Threat Researcher, Palo Alto Networks

Nathaniel Quist

Speaker, Participant

Senior Threat Researcher, Palo Alto Networks/Unit 42

Analytics Intelligence & Response Cloud Security & Virtualization Hackers & Threats Identity

cloud security hackers & threats penetration testing anti-malware threat intelligence



Share With Your Community