Posted on
in Presentations
This session will demonstrate how an attacker uses off the shelf security tools, API calls, and scripting to discover secrets in a public repository, leading to user impersonation in Okta, privilege escalation and sensitive data discovery in Salesforce, and ultimately data exfiltration from AWS. The session will also show attendees how to detect and defend against these types of attacks at every step.
Share With Your Community