Cloud Threat Report: IAM the first line of defense - Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
Estás en »Webinars
Estás en »Webinars
Jueves 2 de Jun, 2022
The ongoing transition to cloud platforms has meant that more sensitive data is stored in the cloud, making it more tempting for adversaries to exploit. When it comes to securing the cloud, identity is the first line of defense. Proper identity and access management (IAM) policies are the foundation of comprehensive cloud security principles. To understand how IAM policies affect organizations' cloud security posture, Unit 42 researchers analyzed 680,000+ identities across 18,000 cloud accounts from 200 different organizations. The results of our research were shocking - nearly all organizations we analyzed lack the proper IAM management policy controls to remain secure. Misconfigured IAM policies open the door for cloud threat actors. We define a cloud threat actor as "an individual or group posing a threat to organizations through directed and sustained access to cloud platform resources, services or embedded metadata." Cloud threat actors merit a separate definition as they employ a fundamentally different set of tactics, techniques and procedures (TTPs) that are unique to the cloud – such as taking advantage of the ability to perform both lateral movement and privilege escalation operations simultaneously. Join Palo Alto and (ISC)² June 2, 2022 at 1:00 p.m. Eastern/10:00 a.m. Pacific for this webinar where the audience will be guided through the latest research in overprivileged IAM identities in real-world cloud environments and how cloud threat actors are zeroing in on these excessive permissions to expand their control of cloud environments. Detection and mitigation of these risks are possible, join us to find out how!
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
11:30 - 12:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
16:00 - 17:00 hs GMT+1
04:00 - 05:00 hs GMT+1
05:00 - 06:00 hs GMT+1
00:00 - 01:00 hs GMT+1
08:00 - 09:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
09:00 - 10:00 hs GMT+1
18:00 - 19:00 hs GMT+1
14:00 - 15:00 hs GMT+1
18:00 - 19:00 hs GMT+1
09:00 - 10:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
00:00 - 01:00 hs GMT+1
02:00 - 03:00 hs GMT+1
04:30 - 05:00 hs GMT+1
09:00 - 10:00 hs GMT+1
15:00 - 16:00 hs GMT+1
10:00 - 11:00 hs GMT+1
16:00 - 17:00 hs GMT+1
05:00 - 06:00 hs GMT+1
09:00 - 10:00 hs GMT+1
00:00 - 01:00 hs GMT+1
06:30 - 07:00 hs GMT+1
03:00 - 04:00 hs GMT+1
05:00 - 06:00 hs GMT+1
10:00 - 11:00 hs GMT+1
18:00 - 19:00 hs GMT+1
05:00 - 06:00 hs GMT+1
08:00 - 09:00 hs GMT+1
00:00 - 01:00 hs GMT+1
01:00 - 02:00 hs GMT+1
06:00 - 07:00 hs GMT+1
08:00 - 09:00 hs GMT+1
18:00 - 19:00 hs GMT+1
06:00 - 07:00 hs GMT+1
09:00 - 10:00 hs GMT+1
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicado el 2-Jul-2020 • 14.23hs
Publicado el 25-Ene-2017 • 19.27hs
Publicado el 20-Ene-2017 • 13.11hs
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy. ... Leer más ►
Publicado el 29-Mar-2019 • 10.12hs
Publicado el 20-Jun-2018 • 11.21hs
Publicado el 31-May-2018 • 10.21hs
... Leer más ►
Publicado el 23-Jun-2020 • 16.05hs
Publicado el 26-Set-2019 • 10.36hs
Publicado el 26-Mar-2019 • 12.09hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs