Posted on
in Presentations
65% of cloud breaches are the result of customer misconfigurations. Organizations rapidly moving workloads to the cloud increasingly rely on cloud service provider identity controls and infrastructure as code templates. In this session, attendees will hear compelling research highlighting threats unique to each as well as offensive tactics they can take to combat them proactively.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community