Securing The Cloud: Offensive Security Strategies for Risk Mitigation

Hear Jessica Stinson, Security Consultant III at Bishop Fox, provide a glimpse into your cloud environment through a hacker’s eyes – depicting how they can access restricted portions of your environment, locate sensitive data, and compromise your trophy targets. She will also discuss offensive security strategies that go beyond misconfiguration reviews with realistic and targeted cloud attack simulations to identify likely attack pathways and help you prioritize remediation where it matters most.


Jessica Stinson BF Headshot

About the speaker, Jessica Stinson

Security Consultant III

Jessica Stinson is a Security Consultant III at Bishop Fox focused on Application Security, Cloud Security, and Source Code Review. In her role at Bishop Fox, Jessica tests applications, internal and external networks, and cloud-based infrastructures for current threats and vulnerabilities with an emphasis on application and cloud security. Jessica is skilled at conducting source code review, analyzing system architecture and threat models while using internal and external tools to identify vulnerabilities within applications and networks.

More by Jessica

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.