Sonrai Security website logo for identity and data governance and cloud security

Anatomy of 5 Notorious Cloud Data Breaches

Go Back
Webinar Featured Image
On-Demand Webinar
Presented By
Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Watch Now

Cloud data breaches follow distinct patterns that can be studied and learned from. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, dissect five notorious and distinct types of cloud data breaches, breaking down how each was caused and how they could have been prevented. Each of these five is an archetype of a family of breaches. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and preventative measures.

Breakdown of the 5 breaches:

  • Identity and authentication for data storage
  • Public cloud misconfiguration
  • Key and secret management
  • Overprivilege
  • Insider threats

You Might Also Like

Webinar Featured Image
Webinar Image 2
Webinar Image 3