Posted on
in Presentations
What makes a cloud security breach? Misconfigurations, exposed APIs, cryptojacking, and more. Attacker motivations don’t change much, but their methods adapt to new technologies, so defenders must adapt too. This session will walk through nine examples of real cloud breaches, discuss what went wrong, why it was interesting, and what defenders can do to avoid ending up on such a list.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community