In this session, we will explore the often overlooked complexities of cloud configurations and their impact on our information security posture:
- Unveiling the Hidden: Understanding the Intricacies of Cloud Environment Configurations
- Identifying Vulnerabilities: Selecting Configuration Rules for Enhanced Security
- Setting the Standard: Leveraging Audit Standards and Security Benchmarks
- Beyond the Basics: Comparing External Cloud Security Posture Management with Native Cloud Security Solutions
Speaker
![](https://devsummit.infoq.com/sites/devsummit/files/styles/medium/public/pictures/2024-06/unnamed%20%283%29.jpeg?itok=j1ycAxBB)
Danielle Sudai
Security Operations Manager @Deliveroo, 10+ Years as Hands-on Specialist in Information Security, Top 100 IT Leaders in UK awarded by Computing (2023)
Danielle leads Cloud Security Operations and SOC teams at Deliveroo. In her main role she is managing all of the Cloud Assets and SaaS solutions security monitoring in identifying real-time threats and security breaches.
Danielle is also a cloud security engineer, in her roles she co-engineered CSPM internal solution, reviewed and governed different cloud services from a security perspective, Cloud IAM misconfigurations and KMS services automation.