When a Zero Day and Access Keys Collide in the Cloud - Responding to the SugarCRM 0-Day Vulnerability
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of attacks against AWS environments in this 24-minute Black Hat conference talk. Map out various cloud security threats using the MITRE ATT&CK Matrix framework and discover multiple prevention mechanisms organizations can implement for protection. Delve into the complexity of these attacks, understanding how seemingly harmless AWS API calls can lead to more severe, difficult-to-trace activities. Learn why a one-size-fits-all approach doesn't work in cloud security and identify key areas to focus on for effective defense against potential threats. Gain valuable insights from Margaret Zimmermann's expertise to enhance your organization's cloud security readiness.
Syllabus
When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day Vulnerability
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network