This talk covers observed threat actor activity against cloud environments, including how we see threat actors most commonly getting into cloud environments, what they do once inside, and common challenges to securing and defending cloud environments. ...
View More