As organizations increasingly adopt cloud technologies, threat actors have adapted their tactics to exploit vulnerabilities within cloud environments. This threat briefing explores the methods employed by malicious actors to compromise cloud services, including the exploitation of misconfigurations, weaknesses in identity and access management, and shared resources. Attendees will learn how the threat landscape is shifting and how to be more proactive by understanding how the tactics, techniques, and procedures are evolving.
talk-data.com
Speaker
Andrew Kopcienski
2
talks
Filter by Event / Source
Talks & appearances
2 activities · Newest first
As organizations increasingly adopt cloud technologies, threat actors have adapted their tactics to exploit vulnerabilities within cloud environments. This threat briefing explores the methods employed by malicious actors to compromise cloud services, including the exploitation of misconfigurations, weaknesses in identity and access management, and shared resources. Attendees will learn how the threat landscape is shifting and how to be more proactive by understanding how the tactics, techniques, and procedures are evolving.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.