As organizations increasingly adopt cloud technologies, threat actors have adapted their tactics to exploit vulnerabilities within cloud environments. This threat briefing explores the methods employed by malicious actors to compromise cloud services, including the exploitation of misconfigurations, weaknesses in identity and access management, and shared resources. Attendees will learn how the threat landscape is shifting and how to be more proactive by understanding how the tactics, techniques, and procedures are evolving.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.
talk-data.com
A
Speaker
Andrew Kopcienski
1
talks
Principle Analyst Google Threat Intelligence Group
Google Cloud
Filtering by:
Google Cloud Next '24
×
Filter by Event / Source
Talks & appearances
Showing 1 of 2 activities