• Solutions
      • Cloud Security Platform
      • Workload / CWPP
      • Platform / CSPM
      • Identity / CIEM
      • Data / Cloud DLP
      • Workflow & Automation
      • Sonrai Identity Graph
      • Use Cases
      • Least Privilege
      • Least Access
      • Cloud Misconfiguration
      • Vulnerability Management
      • Executive Reporting
      • Compliance
      • Cloud Environments
      • AWS
      • Microsoft Azure
      • Google Cloud
      • User Roles
      • Cloud Teams
      • DevSecOps
      • Security Teams
  • Partners
      • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
      • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
  • Resources
    • Resource Library
    • Blog
    • Customer Stories
    • Events & Webinars
  • Company
    • Our Story & Leadership
    • Work With Us
    • Newsroom
    • Awards & Recognition
    • Contact Us
  • Login
  • Request Demo
  • Solutions
      • Cloud Security Platform
      • Workload / CWPP
      • Platform / CSPM
      • Identity / CIEM
      • Data / Cloud DLP
      • Workflow & Automation
      • Sonrai Identity Graph
      • Use Cases
      • Least Privilege
      • Least Access
      • Cloud Misconfiguration
      • Vulnerability Management
      • Executive Reporting
      • Compliance
      • Cloud Environments
      • AWS
      • Microsoft Azure
      • Google Cloud
      • User Roles
      • Cloud Teams
      • DevSecOps
      • Security Teams
  • Partners
      • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
      • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
  • Resources
    • Resource Library
    • Blog
    • Customer Stories
    • Events & Webinars
  • Company
    • Our Story & Leadership
    • Work With Us
    • Newsroom
    • Awards & Recognition
    • Contact Us
  • Login
  • Request Demo
Back to Events & Webinars
Webinar

Anatomy of 5 Notorious Cloud Data Breaches

Webinar Details
Date & Time: 11.20.2019
Type: On Demand
Presenter(s): Sandy Bird, CTO and Co-founder, Sonrai Security
Dan Woods, Principal Analyst, Early Adopter Research
Watch Now

Cloud data breaches follow distinct patterns that can be studied and learned from. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, dissect five notorious and distinct types of cloud data breaches, breaking down how each was caused and how they could have been prevented. Each of these five is an archetype of a family of breaches. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and preventative measures.

Breakdown of the 5 breaches:

  • Identity and authentication for data storage
  • Public cloud misconfiguration
  • Key and secret management
  • Overprivilege
  • Insider threats
Watch Now
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
Sonrai logo FC icon
Request a Demo Login
  • Twitter
  • Linkedin
  • Solutions
  • Cloud Security Platform
    • Workload / CWPP
    • Platform / CSPM
    • Identity / CIEM
    • Data / Cloud DLP
    • Workflow & Automation
    • Sonrai Identity Graph
  • By Use Case
    • Least Privilege
    • Least Access
    • Cloud Misconfiguration
    • Vulnerability Management
    • Executive Reporting
    • Compliance
  • Cloud Environments
    • AWS
    • Microsoft Azure
    • Google Cloud
  • User Roles
    • Cloud Teams
    • DevSecOps
    • Security Teams
  • Partners
    • Partner Alliances
      • Ecosystem Partners & Integrations
      • Global System Integrators (GSI)
      • Solution Providers (VARS, MSP, MSSP, CSP)
    • Cloud Alliances
      • Microsoft Azure
      • AWS
      • Google Cloud
  • Resources
    • Resource Library
    • Blog
    • Events & Webinars
  • Company
    • Our Story & Leadership
    • Careers
    • News
    • Awards & Recognition
    • Contact Us
  • Twitter
  • Linkedin

© 2022 Sonrai Security. All rights reserved

Sitemap   |   Privacy Policy

Sonrai cloud security platform, products and services are covered by U.S. Patent Nos. 10,728,307 and 11,134,085, together with other domestic and international patents pending. All rights reserved.

Scroll to top