Source: Amazon Web Services - Bay Area

A Live Demo of a Cloud Misconfiguration Breach.

This will be online on Zoom. Please download 10 minutes early if you don't already have it.

Topic: A Live Demo of a Cloud Misconfiguration Breach.
Time: Apr 28,[masked]:00 PM Pacific Time (US and Canada)

Join Zoom Meeting
https://intuit.zoom.us/j/94772016131?pwd=bVN1Ukx1Si85eWwvWHV1YW9uS216dz09

One tap mobile
[masked],,[masked]#242424# US (San Jose)
[masked],,[masked]#242424# US (Houston)

Dial-In Only
[masked] US (San Jose)
Meeting ID:[masked]
Password:[masked]

Schedule and Agenda:

6:00 - 6:05 : Arrive and Network!
6:10 - 7:00 : A Live Demo of a Cloud Misconfiguration Breach

Speaker: Josh Stella
Josh Stella is co-founder and CTO of Fugue, the company delivering autonomous cloud infrastructure security and compliance. Previously, Josh was a Principal Solutions Architect at Amazon Web Services (AWS), where he supported customers in the area of national security. Prior to Fugue, Josh served as CTO for a technology startup and in numerous other IT leadership and technical roles over the past 25 years.

Presentation: Cloud misconfiguration is now the leading cause of cloud-based data breaches, typically due to a lack of secure cloud architecture practices. Because cloud infrastructure is 100% software, cloud security is a software engineering problem, not a traditional security analysis problem. In order to prevent data breaches in the cloud, we must address it with secure software architecture right from the start.

In this talk, Josh Stella will run a live simulation of an advanced cloud misconfiguration exploits to show a number of ways common cloud architectural anti-patterns create opportunities for hackers to gain entry to cloud environments, move laterally using tools like IAM services, and ultimately discover and breach data. Many of the misconfigurations exploited won’t be flagged by compliance scans and often aren’t considered risky by security teams.

Attendees will learn
* how common cloud architectural practices can lead to misconfiguration
* how hackers exploit those misconfigurations to breach sensitive data
alternative cloud architectural approaches can prevent them
* Actionable information to improve their cloud security posture

Presence Sponsor: Fugue - https://www.fugue.co/

Want to be a speaker?
If you have an educational DevOps or AWS related topic, please fill out this form (https://goo.gl/forms/mE1f5wJEnyUt3PeR2)

Want to be a Sponsor?
Interested in promoting your company and brand. Sponsor our meetup. It's quick, easy, and profitable! (http://www.meetup.com/awsgurus/pages/20874992/Sponsor_the_AWS_Bay_Area_Meetup/)

Newsletter
  • Get the latest DevOps jobs, events and curated articles straight to your inbox, once a week

  • Community Partners