

iSec | How Misconfigured Deployment Infrastructure Become Attack Vectors
Information
How Misconfigured Deployment Infrastructure Become Attack Vectors
Deployment infrastructures are often treated as trusted backbones of enterprise environments, silently powering software delivery and system provisioning. Yet, when left misconfigured, these very foundations can be transformed into potent attack vectors. Subtle weaknesses ranging from overlooked permissions to insecure defaults can grant adversaries the ability to hijack trust, move laterally, and embed persistence at scale.
This session explores how attackers identify and exploit these hidden cracks, turning operational conveniences into systemic risks. Attendees will gain insights into the attacker’s perspective, understand the real impact of overlooked configurations, and leave with a clearer vision on how to harden and safeguard these critical yet often neglected infrastructures.
Registered attendees


