Session Abstract: Want to defend your cloud and connected assets from threat actors? Then start thinking like one.
But the knowledge of what attackers are doing (and their potential targets) is hard without a unified view.
In this session, learn why it's so easy for attackers to exploit your infrastructure with real examples of malicious activity detected.
You'll walk away with knowledge on how to:
- Identify misconfigurations, discover permissions gaps, and minimize potential privilege exploitation
- Gain better insight into your data and API logs to detect suspicious activity
- Develop a cloud security strategy that extends into your container environment
Summary: Want to defend your cloud and connected assets from threat actors? Then start thinking like an attacker! This session will take you through how to level up your security visibility, gain better insight into your data, and detect suspicious activity.