Session
Security Gaps in Private Azure Architectures
“Private endpoints everywhere” doesn’t automatically mean secure. This session highlights the lesser-known security gaps that still exist in so-called private Azure environments.
We’ll explore DNS pitfalls, outbound traffic blind spots, identity assumptions, and why many “locked-down” architectures still leak data or expose risk often unintentionally.
Target audience: Azure security & networking professionals
Level: Intermediate to Advanced
Duration: 45 minutes
Includes real-world misconfigurations and lessons learned
Works well for security-focused conferences
Chris Hailes
Microsoft MVP, Cloud Technology Strategist, Coffee Snob and Craft Beer enthusiast
Sydney, Australia
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top