Posted on
in Presentations
Imagine taking over an entire AWS account with just an account ID. This session will reveal attack vectors that led to the discovery of multiple critical vulnerabilities in AWS, exposing paths to remote code execution, account takeovers, and data leaks. Attendees will learn how issues were uncovered, how to detect them in their own environments, and actionable steps to enhance cloud security.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community