In our Cloud Security Alliance (CSA) event at Cyber Week 2024, we take a deep dive into the hottest topics in cloud security today.
Gathering & Registration
In our Cloud Security Alliance (CSA) event at Cyber Week 2024, we take a deep dive into the hottest topics in cloud security today.
Gathering & Registration
Opening remarks
Attacking Code-to-Cloud SaaS Infrastructure – The Hottest Trend in 2024
Securing Non-Human Identities
The expert panel on Securing Non-Human Identities will address the critical challenges of protecting machine identities in hybrid and cloud environments.
The discussion will cover the unique security needs of various non-human entities, including APIs, service accounts, and IoT devices. The session will spotlight the latest threats, vulnerabilities, and best practices for managing and securing these identities. Attendees will gain valuable insights into current and emerging technologies and strategies to enhance their cloud security posture and effectively safeguard non-human identities.
Coffee Break
Cloud: Defender’s view
This panel discusses strategies for a secure cloud future.
According to recent online reports, “Nearly 90% of organizations experience damage before containing security incidents,” and “cloud incidents are often not investigated due to visibility issues.” These findings underscore the significant challenges faced in cloud security. Examples include misconfiguration and the complexity of managing security across multiple cloud environments, which remain major hurdles. “Cloud: Defender’s View” explores the balance between prevention and response, readiness, and the future of cloud security.
Cloud: Attacker’s view
This panel delves into the mindset and strategies of malicious actors targeting cloud environments.
This discussion highlights the most common attack vectors and tactics used by cyber criminals to exploit cloud vulnerabilities, including misconfiguration and insufficient access controls. By understanding the attacker’s perspective, security professionals can better anticipate potential threats and enhance their cloud defenses.
Common Threat Actor Tactics observed by AWS Customer Incident Response Team
Verification Code