×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Underestimated Risk: Common Cloud and DevOps Misconfigurations

September 28, 2023

For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We simulate a head-to-head battle.

In this session, we demo some of the most common misconfigurations in Cloud and DevOps environments that attackers can exploit and show you how to effectively mitigate risk.

Previous Article
6 Essential Steps for Identity Security in Multi-Cloud Environments
6 Essential Steps for Identity Security in Multi-Cloud Environments

In 2019, I founded and served as the CEO of a cloud security company (C3M), a journey that eventually led t...

Next Article
Preview! Identity Security for Software Development (O'Reilly)
Preview! Identity Security for Software Development (O'Reilly)

First chapter in the journey to building with Identity, Secrets, and Credentials.