Sonrai Security
Sonrai Security
  • Видео 82
  • Просмотров 11 563
Unlocking Security Insights for Everyone with AI
In this session, we’ll explore how Large Language Models (LLMs) are transforming cloud security by making complex security data accessible to everyone, not just the experts.
With AI, anyone in the organization can ask plain-language questions to get insights from security tools, see progress on risks, and understand what still needs attention-without having to learn the ins and outs of technical dashboards.
Once security info is simplified, it can be shared easily across email and chat, boosting collaboration. By freeing security teams from endless reporting, LLMs let them focus on keeping the organization secure, while ensuring everyone stays informed.
Просмотров: 23

Видео

Practical Steps for Tackling Identity Sprawl with AWS Access Analyzer
Просмотров 12День назад
In the intricate landscape of cloud security, effectively managing identity sprawl is a persistent challenge for organizations. AWS Access Analyzer has emerged as a crucial tool in this ongoing battle, offering enhanced features to identify over-permissioned and unused identities-often termed “zombie identities.” This webinar will dissect the functionalities of AWS Access Analyzer, demonstratin...
Fix What Your CNAPP Found
Просмотров 2121 день назад
Moving from visibility to action in cloud security.
Defeating Cloud Zombies Identifying and Eliminating Hidden Threats
Просмотров 8Месяц назад
In the dynamic realm of cloud security, organizations are in constant pursuit of innovative solutions to shield their cloud environments from the ever-growing array of threats. The SANS CloudSecNext Solutions Summit stands as a pivotal platform that brings to the forefront the latest trends, challenges, and solutions pivotal to cloud security. This solutions track is meticulously curated to pro...
Live Look: Cloud Permissions Firewall
Просмотров 25Месяц назад
If you’re struggling to achieve least privilege and know how cumbersome policy management can be, this webinar is for you. Native cloud security tools leave you writing policy requirements manually, becoming a major time suck and ultimately failing to meet the dynamic needs of cloud architectures. Meet Sonrai’s Cloud Permissions Firewall - a one-click solution for establishing and maintaining a...
From Manual to Automated: Implementing Least Privilege in AWS with SCPs
Просмотров 52Месяц назад
Learn first hand about the journey of achieving least privilege in the cloud using Service Control Policies (SCPs) in AWS. This case study will start by showcasing the manual approach, detailing the design and implementation with cloud-native tools. Then, the discussion will focus on leveraging automation tools to streamline the process, significantly reducing time and effort. Take away practic...
JIT vs Long Lived Roles: Evaluating Cloud Security Strategies
Просмотров 69Месяц назад
JIT permissioning is often hailed as a silver bullet for cloud access, yet its security benefits beyond privilege escalation are hard to quantify. This session delves into the dynamics of JIT roles versus long-lived roles, evaluating their true value and exploring practical implementation strategies to maximize security and efficiency in cloud environments. Presented by: James Berthoty, Cloud S...
Privilege Escalation Deconstructed: Attacks and How to Stop Them
Просмотров 70Месяц назад
Discover how IAM Privilege Escalation attacks work and how threat actors commonly exploit misconfigurations. This session will explain what privilege escalations are, go through a live environment escalating privilege, and discuss common techniques used in the wild. We'll then explain and demonstrate how to find potential PrivEsc paths in the cloud to prevent and detect ongoing attacks. Present...
What is a Cloud Permissions Firewall Anyway?
Просмотров 93Месяц назад
Discover the Cloud Permissions Firewall concept and its role in modern cloud identity security. This session explores achieving least privilege at scale with a default-deny model that works, delving into real-world applications and benefits. See it in action to gain an understanding of how implementing a permissions firewall will solve the overpermissioned and unused identity problem in your cl...
IAM in the Cloud: Successes, Pitfalls, and Lessons Learned
Просмотров 145Месяц назад
Learn how companies of all sizes and maturity levels have addressed the complexities of managing identities in the cloud to reduce risk. Through real-world examples and expert insights, this session reveals both successes and pitfalls in cloud IAM. Gain practical strategies today to elevate your organization's cloud identity security. Presented by: Chad Lorenc, Security Delivery Manager, AWS
What Everyone Should Know About Cloud Permissions
Просмотров 83Месяц назад
Dive into the current state of cloud permissions and identities, focusing on strategies to identify and mitigate risks. Review the latest analysis on the scale of cloud permissions in typical environments, gain insights into newly introduced risky permissions by cloud providers and learn effective measures to address these risks. Presented by: Nigel Sood, Cloud Security Researcher, Sonrai Secur...
Permissions Boundaries and SCPs: The Cloud IAM Invariants
Просмотров 42Месяц назад
Join us as we unravel the complexities of permissions boundaries and Service Control Policies and discover their power in preventing privilege escalation while supporting delegated administration. Through real-world examples and clear explanations, you'll gain practical knowledge to enhance your cloud security and streamline your IAM strategy. Presented by: Rich Mogull, Researcher and CEO, Secu...
Navigating the Challenges of Cloud Permissions: Ownership, Maturity, and Centralized Control
Просмотров 119Месяц назад
Explore the challenges of least privilege and who should own this critical issue. Delve into the three phases of maturity for addressing the problem and master strategies to centralize permissions management to lighten the load on developers. Walk away with specific policies you can implement today to protect the most powerful permissions in your cloud. Presented by: Sandy Bird, Co-Founder and ...
Using AWS SCPs to Achieve Least Privilege while Supporting Developers
Просмотров 573 месяца назад
Traditionally, achieving least privilege means a lot of identity-by-identity policy creation and management. In this session, explore a new approach to least privilege that leverages AWS SCPs to centrally restrict excessive permissions and secure unused identities, services, and regions. By protecting only the most sensitive cloud permissions, developer innovation remains intact.
SCP Writing 101 Workshop
Просмотров 363 месяца назад
If you are working with SCPs and want to increase your expertise, this workshop is for you. Join Sandy Bird, Sonrai Security Co-Founder and CTO, and Christophe Limpalair, Cybr Founder, for a hands-on session where you will learn how to write SCPs to protect some of the most powerful permissions in your AWS environment. In this interactive session, you will: - Write 3-5 SCPs to block tampering o...
Quarantine Zombie Cloud Identities with Cloud Permissions Firewall
Просмотров 474 месяца назад
Quarantine Zombie Cloud Identities with Cloud Permissions Firewall
The 5-5-5 of SCPs Webinar
Просмотров 354 месяца назад
The 5-5-5 of SCPs Webinar
A Realist Approach to Least Privilege in Cloud
Просмотров 294 месяца назад
A Realist Approach to Least Privilege in Cloud
Restricting Unused Excessive Permissions with Cloud Permissions Firewall
Просмотров 615 месяцев назад
Restricting Unused Excessive Permissions with Cloud Permissions Firewall
Get to Know the Cloud Permissions Firewall
Просмотров 2505 месяцев назад
Get to Know the Cloud Permissions Firewall
Least Privilege Made Achievable & Scalable! You Read That Right.
Просмотров 225 месяцев назад
Least Privilege Made Achievable & Scalable! You Read That Right.
CSA x Sonrai Webinar: Least Privilege Reality Check: Refining Cloud Access and Permissions
Просмотров 235 месяцев назад
CSA x Sonrai Webinar: Least Privilege Reality Check: Refining Cloud Access and Permissions
The (IAM) Call is Coming From Inside the House (SANs Spring Cyberfest 2024)
Просмотров 176 месяцев назад
The (IAM) Call is Coming From Inside the House (SANs Spring Cyberfest 2024)
Rethinking Least Privilege: How to Slash Your Cloud Risk Overnight (SANs Spring Cyberfest 2024)
Просмотров 456 месяцев назад
Rethinking Least Privilege: How to Slash Your Cloud Risk Overnight (SANs Spring Cyberfest 2024)
Believe It or Not One Click Least Privilege
Просмотров 1036 месяцев назад
Believe It or Not One Click Least Privilege
Introducing the Cloud Permissions Firewall
Просмотров 2,3 тыс.7 месяцев назад
Introducing the Cloud Permissions Firewall
Four Proactive Steps to Secure Access in Your Cloud - Webinar
Просмотров 1810 месяцев назад
Four Proactive Steps to Secure Access in Your Cloud - Webinar
Sonrai's 4 Step Process to Securing Cloud Identities
Просмотров 4310 месяцев назад
Sonrai's 4 Step Process to Securing Cloud Identities
Ranking Sensitive Cloud Permissions by Risk
Просмотров 510 месяцев назад
Ranking Sensitive Cloud Permissions by Risk
How to Centralize Multi-Cloud Security
Просмотров 910 месяцев назад
How to Centralize Multi-Cloud Security

Комментарии

  • @RodGuareschi
    @RodGuareschi 5 месяцев назад

    Can you elaborate on how you got access to the public IP of that EC2? In the demo, we can only see its private IP. 🤔 Thanks

    • @securityjeff
      @securityjeff 5 месяцев назад

      Hi, I'm Jeff and this is me in the video. I used an RFC1918 ip in the video just as a placeholder for what in real-life would be the actual public ip. I hope this helps and appreciate you watching!