Posted on
in Presentations
How do attackers maintain stealth, escalate privileges, and gain persistence in AWS, GCP, or Azure? Learn new red team techniques such as unlogged enumeration, hiding credentials and serverless function, and cloud shell backdoors. Apply techniques against live AWS, GCP, and Azure environments and then learn mitigation, detection, and remediation strategies to secure the environment.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community