Posted on
in Presentations
Explore a real-world multi-stage AWS attack involving exposed IAM credentials, lateral movement via EC2, privilege escalation through federated session tokens, and persistent access using Lambda. Learn threat detection techniques and remediation strategies to secure cloud infrastructure. Ideal for cloud engineers and incident responders looking to strengthen AWS defenses against evolving threats.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community