cloud-g5578d47c6_1920

Please enter your details below to sign-up for the webinar:

Overview: 

The last couple of years have seen a tremendous growth in cloud adoption. Every organisation has some cloud usage, relying either on a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organisation’s security landscape.

Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organisations up to be more severely punished for their mistakes.

In this webinar, we will discuss various scenarios where cloud-based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved.

We will look at ways to exploit these cloud environments from an attacker’s point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete takeover of the cloud network.

Target Audience:

The webinar is ideal for web developers, cloud engineers, SOC analysts, intermediate level penetration testers, DevOps & DevSecOps engineers, network engineers, security & cloud architects and security enthusiasts.

 

About the speaker: 

Martin Cernac, Black Hat Trainer, and accredited pentester

Martin Cernac

Martin is Senior Security Consultant at NotSoSecure. He is experienced at carrying out security assessments/penetration tests of web applications and infrastructure and has delivered technical training at conferences such as Black Hat EU/USA/Asia.