Due to the increase in cloud-based attacks, we picked three devastating and evasive real-world scenarios to show how attackers can gain access and move laterally in SaaS applications to perform reconnaissance and steal sensitive data. This session shows how attackers can exploit API, administrative, and user session vectors to access data in SaaS applications. Be sure to review Matt’s original session and come to this interactive follow up prepared to listen and learn with Matt and other attendees who are similarly interested in this topic as he delivers a quick summary of his session, shares new insights he’s had since the presentation was delivered, and engages with you and your questions on this topic.
Broadcast on
in Top-Rated Session Follow Ups
February 22, 2023 | Pain in the Apps — Three Attack Scenarios Attackers Are Using to PWN SaaS: Top-Rated Session Follow Up with Matt
11:00 AM ET | 8:00 AM PT
Watch the original session on demand, anytime.
DevSecOps & Application Security Hackers & Threats
application security cloud security data security exploit of vulnerability
Pass Requirements
- Full Conference
- Press
- Digital Pass
- Speaker
Share With Your Community