Cloud environments are an easy target for attackers, especially if you’ve made yourself a prime target with the common misconfigurations we’ll be looking at in this webinar. By understanding the techniques attackers use to infiltrate cloud systems and pivot to on-prem networks, you can avoid these misconfigurations and better secure your cloud environments.
In this webinar Luiz Simpson, Head of Red Team, and Ben Shaw, Red Team Specialist, will discuss the tactics used by attackers to infiltrate cloud systems and share the best techniques to detect, prevent, and respond to these attacks. This webinar will also include a demonstration on how attackers bypass Multi-Factor Authentication (MFA) and Conditional Access controls.
Webinar Highlights:
Learn how attackers compromise cloud environments and laterally move to on-prem
Understand the misconfigurations which real world attackers commonly leverage
See a demonstration of the latest methods used by attackers, including how they bypass MFA and conditional access
Understand how access control and permissions can be detected and abused
Equip yourself with the knowledge to detect and prevent against these sophisticated attacks
Speakers

Luiz Simpson
Head of Red Team
Bridewell

Ben Shaw
Red Team Specialist