Session
Hack The Cloud: Attackers Love Blind Spots, Break Their Hearts
Malicious actors, on an unholy crusade, have discovered that a lack of visibility across Cloud, SaaS, and Identity, combined with legacy controls that provide limited cloud detection and response capabilities, grants them a nefarious advantage. This lack of visibility, detection, and response in cloud environments allows malicious actors to operate with an elevated ability to breach organizations, evade detection, and maintain persistence.
As businesses transition to the cloud, critical assets, sensitive data, and an increasing array of interconnected SaaS applications have followed. This shift attracts malicious actors eager to exploit any visibility gaps, such as those caused by the segmentation of environments across workloads and SaaS. While such segmentation is a beneficial security best practice for incident prevention, it also provides a stealthy refuge for attackers. In essence, your SecOps team is operating within a landscape fraught with invisible threats.
This presentation will explore real-life stories from the trenches, drawn from years of cloud-based incident response. Various hacks will be explored to illustrate how breaches occur, what happens following a breach, and why organizations are struggling to detect and respond.
Finally, we will cover mitigation strategies such as proactively preparing for a breach, discovering malicious activity, and responding. Malicious actors are counting on your passivity, your blind spots, and your inability to effectively detect and respond to attacks in the cloud. Break their hearts!
Attendee Takeaways
• Understand how malicious actors exploit cloud visibility gaps.
• Explore demonstrations that illustrate breach techniques.
• Learn about real-life incidents detailing breach methods and detection challenges.
• Leave with mitigation strategies.

Brian Contos
Field CISO, Mitiga
San Francisco, California, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top