Posted on
in Presentations
Pen testers poke at misconfigured IAM policies, cloud users open their environments to attack, and attackers target IAM credentials while cryptojacking. Dive into how Identity impacts cloud environments from three different angles: a red team case study, alert analysis from thousands of accounts across three major CSPs, and how cryptojacking malware authors are targeting IAM credentials.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community