Cloud attack vectors and security controls are different. Many companies breached on AWS moved sensitive data to AWS without following best practices or implementing cloud security controls correctly. Research indicates that devs are the new security target and attackers can use the same tools developers use on AWS. See Kolby Allen and Teri Radichel duke it out as Teri attacks an AWS account and Kolby defends it.
Learning Objectives: 1: Learn about the risks of improperly secured public cloud environments. 2: Observe real-world examples and tools on how to mitigated security risks. 3: Learn how to leverage automation to make it repeatable and secure.