USA: 08.00 - 09.00 PST
USA: 11:00 - 12:00 EST
Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester.
In the session, Scott will explore cloud storage specific security considerations. This short, but informative, webinar will examine real-world examples of how common misconfigurations can lead to vulnerabilities which unethical hackers can exploit to gain access to sensitive information stored in the cloud. These kinds of vulnerabilities are all the more prevalent due to the inability of traditional vulnerability scanners to detect them. You will learn about;
- Examples and case studies of the storage abuse
- Supply chain attacks
- Cloud native ransomware
We will cover live demonstrations of malicious actors modus operandi including enumeration and exploitation. We will be giving an automated storage audit tool which will allow you to determine your own level of risk in your storage deployment. There will be time for you to quiz our cloud security expert too - Not just on storage but anything cloud related across all three vendors!
All this makes the webinar ideal for those with existing cloud environments or those planning to move to a cloud environment.
Register to join, we look forward to talking to you.