JAN 11, 2022 12-1PM PT
What you'll learn from this webinar:
- How to ensure Zero trust in your cloud environment
- When and how to leverage red team exercises
- Outside-in and Inside-out tactics for finding potential
VISIBILITY INTO DATA STORES AND OBJECTS
Most security and compliance problems are about data flows — from sensitive data objects to risky identities.
Did an external account write malicious data into a datastore? Can contractors and vendor identities access customer data in the clear?
Least-privilege IAM policies. My organization has a complex web of IAM policies — what data is at risk from service roles used by vendors, contractors, CI/CD tools, internet-facing applications?
OWASP attacks on applications and APIs.
A bug-bounty finds a critical CVE. Which specific data objects may have been breached — which specific users should be notified of a breach?
Credential theft or Account take-over.
What data objects were stolen using an identity? How can I reduce the blast radius with data-centric IAM policies?
Zero-trust applies risk-based controls and multiple-factor authentication to identities.