Skip to content

Securing the Cloud - Attack Vectors

Photo of Jason Hayes
Hosted By
Jason H.
Securing the Cloud - Attack Vectors

Details

Special thanks to BeyondTrust who is this month's meeting sponsor and presenter.

Topics that we'll cover in our April meeting:
- Key definitions of modern cloud technologies, threats, and cybersecurity solutions.
- How entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment.
- How to implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments.
- How to develop models for documenting risk, compliance, and reporting based on your cloud implementation

Photo of Colorado Cloud Security Alliance - Meeting RSVP Group group
Colorado Cloud Security Alliance - Meeting RSVP Group
See more events