AWS San Francisco, Moscone Center South Halls B/C
Visit Fugue a part of Snyk at booth 712. Hear the latest from AWS experts and Fugue. Whether you are new to AWS or already running workloads we want to see you there.
Conf42: Cloud Native 2022
Josh Stella will speak on 'Understanding Cloud Control Plane Compromise Attacks'. In this session, Josh Stella (chief architect at Snyk) will deconstruct how control plane compromise attacks go down in the cloud, and how teams can recognize and address the architectural design flaws in their cloud environment that make them vulnerable. You’ll walk away from this session with an understanding of: -How cloud hackers think and operate in order to steal data -What questions you should be asking about the security of your cloud environment -Why cloud security is a design problem, and what secure cloud design looks like
The Missing Story with every Cloud Breach
In this session, Snyk chief architect Josh Stella will explain how nearly every major cloud breach goes down, and why cloud security keeps failing even the most sophisticated teams and organizations. He’ll walk through how attackers are not only exploiting individual resource misconfigurations, but also architectural design vulnerabilities that enable them to compromise the cloud API control plane in order to discover and extract data without detection.
Deconstructing Control Plane Compromise Attacks
While the details vary, every major cloud breach follows the same pattern, with control plane compromise playing a central role. In the cloud, the API surface is the attack surface. Attackers use automation to find vulnerabilities to gain initial access to an environment. Once in, they’re after API keys that enable them to operate against the cloud control plane in order to discover knowledge about the environment, move laterally, and extract data without detection. In this session, Josh Stella, Chief Architect at Snyk, will deconstruct how control plane compromise attacks go down in the cloud, and how to spot the kinds of architectural design flaws that they’re exploiting. You’ll walk away from this session with an understanding of: How cloud hackers think and operate against the cloud control plane Identifying control plane compromise risk in your environment Why inherently secure cloud design looks like
Brighttalk Conference on Cyber Threats Prevention-How Hackers Compromise the Cloud Cloud Control Plane
In this session, Josh Stella, Chief Architect at Snyk, will walk through the ways control plane compromise attacks happen, and why you need to go beyond traditional cloud security posture management in order to spot the deeper design flaws in your environment that make these attacks possible. Attendees will gain an understanding of: What the cloud control plane is and why attackers need access to it How to identify control plane compromise risks in your environment Why cloud security hinges with secure design, and where to start