Securing the Cloud - Attack Vectors

Hosted By
Jason H.

Details
Special thanks to BeyondTrust who is this month's meeting sponsor and presenter.
Topics that we'll cover in our April meeting:
- Key definitions of modern cloud technologies, threats, and cybersecurity solutions.
- How entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment.
- How to implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments.
- How to develop models for documenting risk, compliance, and reporting based on your cloud implementation

Colorado Cloud Security Alliance - Meeting RSVP Group
See more events
Securing the Cloud - Attack Vectors