AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Navigating Cloud Identity and Access Risks
This chapter explores the complexities of managing identity and access in cloud environments, emphasizing the risks that arise from overly permissive access rights and inadequate monitoring. The speakers discuss the shift in cybersecurity approaches within organizations, advocating for a more strategic understanding of vulnerabilities and the importance of realistic training scenarios. They highlight tools like BloodHound for identity analysis, sharing insights on improving security assessments and addressing challenges in device management.