Serverless Attack Vectors

Posted on in Presentations

Serverless is all the rage in cloud computing. Large-scale applications are being deployed on serverless architectures. What does security look like in this brave new world? What types of attacks might an attacker carry out on in this environment? Come find out in this session that will focus on attacking and defending serverless infrastructure and applications.

Pre-Requisites: General understanding of breaches and basic awareness of simple code concepts.

Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.

Teri Radichel


CEO, 2nd Sight Lab

Hackers & Threats DevSecOps & Application Security Cloud Security & Virtualization

secure coding hackers & threats DevSecOps cloud security



Share With Your Community