Archived: Is Cloud IAM really the new perimeter?

On-Demand Webcast|1 Hour

We've moved away from having discrete access controls associated with each of our datacenter services to leveraging the public cloud where we issue credentials with full administrative power across all cloud capabilities, including virtual machines, containers, networking, DNS, storage buckets, long-term archived storage and often much more. In the SANS 2019 Cloud Security Survey, respondents stated nearly half of attacks involved account or credential hijacking and 38% of respondents reported privileged user abuse. If those credentials represent enough privilege, it takes only one mistakenly embedded set in a test script to be catastrophic.

Join Orca on this webcast to:

• understand the importance of considering the blast radius (or scope) in security alert scoring; and
• learn how to dramatically improve your security posture and ultimately keep you safe by.

Attendees of this webcast may be eligible for one CPE credit.


Patrick Pushor

Technical Evangelist

Orca Security

Patrick is a serial startup technologist having played early and key roles in over six startups across four countries in the past 12 years including multiple cybersecurity and fintech companies. Previously, he worked as an independent consultant focused on infrastructure and integration projects in nearly every industry from national defense to agriculture. More recently, Patrick helped define the CSPM market as an early employee at Dome9 Security and is leveraging that experience at Orca Security to revolutionize how we think about and approach cloud workload protection.