Nine Cloud Security Reasons for Resting Breach Face


Posted on in Presentations

What makes a cloud security breach? Misconfigurations, exposed APIs, cryptojacking, and more. Attacker motivations don’t change much, but their methods adapt to new technologies, so defenders must adapt too. This session will walk through nine examples of real cloud breaches, discuss what went wrong, why it was interesting, and what defenders can do to avoid ending up on such a list.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Maya Levine

Speaker

Product Manager, Sysdig


Share With Your Community