Is Cloud IAM really the new perimeter?

We've moved away from having discrete access controls associated with each of our datacenter services to leveraging the public cloud where we issue credentials with full administrative power across all cloud capabilities, including virtual machines, containers, networking, DNS, storage buckets, long-term archived storage and often much more. In the SANS 2019 Cloud Security Survey, respondents stated nearly half of attacks involved account or credential hijacking and 38% of respondents reported privileged user abuse. If those credentials represent enough privilege, it takes only one mistakenly embedded set in a test script to be catastrophic.

Join Orca on this webcast to:

• understand the importance of considering the blast radius (or scope) in security alert scoring; and

• learn how to dramatically improve your security posture and ultimately keep you safe by.

Attendees of this webcast may be eligible for one CPE credit.