Login
Sonrai Security website logo for identity and data governance and cloud security

Anatomy of 5 Notorious Cloud Data Breaches

Go Back
On-Demand Webinar
Presented By
Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Watch Now

Cloud data breaches follow distinct patterns that can be studied and learned from. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, dissect five notorious and distinct types of cloud data breaches, breaking down how each was caused and how they could have been prevented. Each of these five is an archetype of a family of breaches. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and preventative measures.

Breakdown of the 5 breaches:

  • Identity and authentication for data storage
  • Public cloud misconfiguration
  • Key and secret management
  • Overprivilege
  • Insider threats

You Might Also Like

Webinar - Managing Non-people Identities in AWS, Azure
Webinar - Comparing Security in AWS, Azure and GCP
Webinar - Preventing Data Loss in AWS, Azure and GCP
© 2020 Sonraí Security. All rights reserved | Privacy Policy
Sonrai Security cloud security platform, products and services are covered by U.S. Patent No. 10,728,307, together with other domestic and international patents pending. All rights are reserved.
magnifier