Webinar
Securing Cloud identities: Mitigating Vulnerabilities in your Cloud Environment
- Cloud
- Tenable Cloud Security
Preventing Ransomware and Strengthening Your Cloud Security with Tenable’s Health Check Program
The Cyber Security Agency of Singapore (CSA) released an advisory in 2025, identifying critical vulnerabilities in AWS S3 buckets, including compromised IAM credentials and overly permissive roles.
“Analysis of AWS, GCP and Microsoft Azure reveals that 23% of cloud identities, both human and nonhuman, have critical or high severity excessive permissions” - Tenable Cloud Risk Report 2024
These weaknesses enable attackers to assume privileged identities, re-encrypt data with new encryption keys, and demand ransom.
In this webinar, we will delve into how attackers exploit cloud identities with elevated access to re-encrypt your data and extort ransom. We’ll also highlight how the Tenable Cloud Health Check program can help mitigate these vulnerabilities and enhance your cloud security posture with actionable insights.
Key takeaways:
- Address compromised IAM credentials and overly permissive roles by enforcing least privilege & audit IAM permissions
- Detect identity anomalies to spot potential breaches early and protect against unauthorized access
- Effectively identify & secure S3 buckets to ensure tight access control
- A live demo showcasing real-life use case
Join us for a complimentary Tenable Cloud Health Check!
Who Should Attend?
CISOs, cloud security architects and practitioners, IAM specialists, and others responsible for managing and reducing risk across public, hybrid, and private cloud environments.
Save your spot. Register now.
If you can’t make the live session, register anyway and we’ll email you a link to the replay.
Speakers

Wing Churn Leong
Senior Cloud Security Engineer, Tenable

Alvin Yeo
Territory Manager, Cloud Security, Tenable