Privilege Escalation Deconstructed: Attacks and How to Stop Them

Описание к видео Privilege Escalation Deconstructed: Attacks and How to Stop Them

Discover how IAM Privilege Escalation attacks work and how threat actors commonly exploit misconfigurations. This session will explain what privilege escalations are, go through a live environment escalating privilege, and discuss common techniques used in the wild. We'll then explain and demonstrate how to find potential PrivEsc paths in the cloud to prevent and detect ongoing attacks.

Presented by:
Christophe Limpalair, Founder & Trainer, Cybr

Комментарии

Информация по комментариям в разработке