Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?
Briefly

The talk addresses security posture management (CSPM) as a critical technology for identifying breaches and threats due to misconfigurations in cloud environments. Led by a security operations manager experienced in DevSecOps, the session begins with an overview of CSPM, the historical context of cloud infrastructure, and notable industry breaches stemming from misconfigurations. Furthermore, participants will learn key terms and develop skills to effectively configure detection systems from a security perspective, culminating in practical sessions on CSPM workflows to emphasize real-time threat identification from a developer's viewpoint, bridging gaps between engineering and security.
In the last decade, I've been working as a DevSecOps, basically, focusing on my last role, my main hands-on technical role as a DevSecOps engineer.
First of all, we'll go through the overview, learning some objectives, and what we're going to cover. The second thing...is why, what, and how.
We are going to review the five main breaches that happened in the industry because of misconfigurations in the cloud.
Then we're going to actually understand what CSPM is and go through the life cycle.
Read at InfoQ
[
|
]