Interop is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How is IT changing? What are the new technologies? How is my job changing?

At Interop Digital, we nurture every aspect of your career by offering content across all key technologies and stages of your career. Experience collaboration and innovation with the industry’s most thought after leaders.

Simulating Real-Time Cloud Misconfiguration Attacks to Improve Cloud Security

Josh Stella  (Co-Founder & CTO, Fugue)

Date: Wednesday, October 7

Time: 12:00 pm - 12:35 pm

Pass Type: Certification + Conference, Training + Conference, Conference Only - Get your pass now!

Event Type: Session

Track: Security

Vault Recording: TBD

Audience Level: Advanced

Cloud misconfiguration is the number one cause of data breaches, which is always the fault of the cloud customer. Bolting on cloud security solutions fails because cloud security is a software engineering problem, not a traditional security analysis problem. In order to prevent data breaches in the cloud, we must address it with secure cloud configuration and software architecture approaches.

In this talk, we'll run a live simulation of an advanced cloud-native misconfiguration exploits to show a number of ways common cloud architectural and operational anti-patterns create opportunities for hackers to gain entry to cloud environments, move laterally using tools like IAM services, and ultimately find and breach data.

At each step, we'll share alternative approaches to architecting cloud infrastructure services to ensure our applications run efficiently while denying bad actors the tools and means to exploit them. Attendees will leave with actionable insights to evaluate their own cloud environment for misconfiguration vulnerabilities and how to address them without slowing down innovation or removing the power that cloud computing delivers.