Cloud Defender: Detecting and Responding to Adversaries in AWS

Posted on in Presentations

Get first-hand experience with cloud penetration techniques, see what they look like and learn how to defend against them. You will use the provided template to spin up an example AWS environment in your account, hack it using scripts and watch the attack unfold in real time. Use evidence from the attack to create automated countermeasures. Leverage built-in AWS services to detect signs of compromise.

Learning Objectives:
1: Experience examples of real-world advanced public cloud hacking.
2: Learn ways to detect public cloud hacking by combining weak signals.
3: Get templates to create a hack lab in your own cloud and see for yourself.
Martin Holste


CTO, Cloud, FireEye, Inc.

Paul Lee


Senior Cloud Solutions Engineer, FireEye, Inc

Josh Madeley


Principal Consultant, FireEye

Share With Your Community