IAM Confused - Analyzing 8 Identity Breach Incidents

Logo
Presented by

Maya Levine, Product Manager, Sysdig

About this talk

Almost every cloud breach in recent years has taken advantage of mismanaged permissions, secrets, and identities. This session will dissect 8 real cloud breaches where attackers exploited insecure identities, each scenario unveiling unique insights, intriguing facets, and advice to mitigate similar risks. Themes include: Ownership of identity posture b/w Dev, Ops, & Sec is often unclear, leading to mistakes that stem from going fast. Automation tech, serverless functions, & cloud-native activities require authentication. Often, this is poorly managed, e.g., leaving secrets/credentials exposed in S3 state files (Human/machine identity management). MFA abuse through social engineering still works well. SaaS apps are huge attack surfaces, with credentials left everywhere: repos, Github, AD, and Slack. We will specifically highlight something interesting in each scenario and provide a key takeaway that is more useful than “lock your stuff down.”
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (60)
Subscribers (10474)
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation. Sysdig. Secure Every Second.