Monday 4 July 2022, 11am-12noon (BST)
The widespread adoption of cloud-services combined with the need to share knowledge rapidly continues to provide opportunity for information to end up in the wrong hands. And our cloud misconfigurations provide threat actors with a further wealth of useful intelligence to later leverage in targeted attacks against us.
In this webinar, we assessed some of the most common issues, shared how to educate your organisation, and took a look at open-source intelligence techniques for red-teamers and bug-bounty hunters to use in future engagements.
Guest chaired by
Lee Cramp (info), DPO, DRO and Information Security, Department of Health and Social Care
Presented by
Tom Cock (info), Security Architect, Varonis