Advanced Discovery, Persistence and Privilege Escalation in AWS, GCP, Azure

Tuesday, May 7, 2024
8:30 AM - 10:30 AM PT
Not Recorded
How do attackers maintain stealth, escalate privileges, and gain persistence in AWS, GCP, or Azure? Learn new red team techniques such as unlogged enumeration, hiding credentials and serverless function, and cloud shell backdoors. Apply techniques against live AWS, GCP, and Azure environments and then learn mitigation, detection, and remediation strategies to secure the environment.

Media, College Day, and Security Scholars are not permitted to attend.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. Media Pass holders, College Day Pass holders, and Security Scholars are not permitted to attend. This is a capacity-controlled session. You may reserve a seat in only one Learning Lab. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Colin Estep

Facilitator

Principal Security Researcher, Netskope

Jenko Hwong

Facilitator

Principal Security Researcher, Netskope



Topic/Track
Cloud Security

Type/Format
Learning Lab

Session Classification
Intermediate - Technical

Pass Requirement
  • CISO BOOT CAMP
  • Cyber Leaders Forum
  • eFraud Global Forum
  • Executive Security Action Forum
  • Full Conference
  • Speaker

Session Code
LAB1-T01


Share With Your Community