Nine Cloud Security Reasons for Resting Breach Face


Posted on in Presentations

What makes a cloud security breach? Misconfigurations, exposed APIs, cryptojacking, and more. Attacker motivations don’t change much, but their methods adapt to new technologies, so defenders must adapt too. This session will walk through nine examples of real cloud breaches, discuss what went wrong, why it was interesting, and what defenders can do to avoid ending up on such a list.


Participants
Maya Levine

Speaker

Product Manager, Sysdig


Share With Your Community