Prevent Cloud Incidents from Becoming Cloud Breaches

  • Tuesday, 30 Apr 2024 10:00AM EDT (30 Apr 2024 14:00 UTC)
  • Speaker: Brandon Evans

The number of cloud security breaches in the headlines have been staggering lately. It seems like a week cannot go by without a massive amount of sensitive data being leaked from either AWS, Azure, or Google Cloud.

One example that would be funny if it were not so sad is the September 2023 incident where the Microsoft AI team leaked 38TB of sensitive data, including employee workstation backups and 30,000 internal Teams messages, due to a misconfigured storage configuration. How is the industry failing to use the clouds properly, let alone Microsoft, the extremely mature company who created Azure in the first place?

Join Brandon as he shares his analysis on this trend. He will discuss the unique challenges of protecting the cloud, why the cloud providers are unable to solve these problems alone, why multicloud makes matters even more difficult, and how your organization can take practical measures to mitigate the impact of cloud incidents. The presentation will include case studies of real breaches that were made much worse due to a lack of defense-in-depth. Learn how to prevent real attacks with controls that matter.

 Learning objectives: You will learn:

  • Why the vast majority of breaches are in the cloud.
  • Why the cloud is largely insecure by default.
  • How to calculate the effort to secure multiple cloud providers.
  • How you cannot solve these challenges with standardization and cloud agnosticism alone.
  • About multiple cloud security incidents that went from bad to worse because of a lack of cloud controls.
  • High-level best practices for mitigating the impact of cloud incidents

This webcast is based on content from SANS Institute SEC510: Cloud Security Controls and Mitigations. SEC510 provides cloud security analysts, engineers, and researchers with practical security controls that can help organizations reduce their attack surface and prevent security incidents from becoming breaches. To learn more, please visit here, review the syllabus, and click the Course Demo button for a free peak at the courseware.