DEFCON Cloud Village
- Learn about how an attacker can perform reconnaissance, leverage network, IAM Misconfiguration, S3 misconfiguration, and implementation in weaknesses to steal credentials and data.
- Learn how misconfigurations and other leading cloud vulnerabilities put you at risk to exploitation with some real-world example
- Learn about what can be possible best practices, detective controls to avoid these misconfigurations