Главная
Study mode:
on
1
Introduction
2
The world has changed significantly
3
More and more breaches occur
4
The process remains the same
5
The old way
6
The cloud makes life easier
7
Responsibility differences
8
How to fix it
9
No Accountability
10
Create a Strategy
11
SAML 20 Issues
12
Cyberark Labs
13
GoldenSaml
14
Security Tenants
15
Access Keys
16
Secrets
17
How to Secure
18
DevOps Tools
19
Good Practices
20
Managing Secrets
21
Orchestration
22
Processes
23
Identity vs Security
24
Application Identity
25
The Most Important Part
26
Free Tools
27
DNA
28
Cyberark
Description:
Explore a comprehensive conference talk from BSides Indianapolis 2018 that delves into securing privilege in cloud and DevOps workflows. Learn about the evolving landscape of cybersecurity, the challenges posed by cloud adoption, and effective strategies to mitigate risks. Discover the importance of accountability, SAML 2.0 issues, and the concept of GoldenSAML. Gain insights into securing access keys, managing secrets, and implementing best practices in DevOps environments. Understand the critical distinction between identity and security, and explore the concept of application identity. Acquire knowledge about free tools and resources to enhance your organization's security posture in the rapidly changing digital landscape.

Zero to Owned in 1 Hour - Securing Privilege in Cloud and DevOps Workflow

Add to list