The presentation by Josh Stella at InfoSec World focuses on the significant security risks posed by cloud misconfiguration, which is a primary factor in most cloud service attacks. It includes a live demonstration of misconfiguration exploits and offers actionable steps for securing cloud environments, such as implementing monitoring and the principle of least privilege. Key recommendations highlight the importance of automated remediation, clean-up of unused resources, and inclusion of cloud misconfiguration in penetration testing.
Related topics: