DEF CON 29 Cloud Village - Rod Soto - Detection Challenges in Cloud Connected Credential Attacks
DEF CON 29 Cloud Village - Wes Lambert - Onions In the Cloud Make the CISO Proud
DEF CON 29 Cloud Village - Mazin Ahmed - Attack Vectors on Terraform Environments
DEF CON 29 Cloud Village - Michael Raggo - Identifying Toxic Combinations of Permissions
DEF CON 29 Cloud Village - Daniel Prizmant - Windows Server Containers are Broken
DEF CON 29 Cloud Village - Rami McCarthy - Cloud Security Orienteering
DEF CON 29 Cloud Village - Kevin Chen - PK WHY
DEF CON 29 Cloud Village - Felipe Pr0teus - Hunting for AWS Exposed Resources
Extracting all the Azure Passwords - Karl Fosaaen (DEF CON 29 - Cloud Village)
DEF CON 29 Cloud Village - Joshua - Understanding Google Cloud Misconfiguration Using GCP Goat
DEF CON 29 Cloud Village - Igal Flegmann - I know who has access to my cloud, do you
DEF CON 29 Cloud Village - Yuval Avrahami - WhoC Peeking under the hood of CaaS offerings
DEF CON 29 Cloud Village - Mohammed Aldoub - Using Barq to Perform AWS Post-Exploitation
DEF CON 29 Cloud Village - Alexandre Sieira - Attack Vectors for APIs w AWS API Gateway Lambda Auth
DEF CON 29 Cloud Village - Batuhan Sancak - Azure Active Directory Hacking Wars
DEF CON 29 Cloud Village - Jayesh Singh Chauhan - Opening Note
DEF CON 29 Cloud Village - Cassandra Young - Exploiting the O365 Duo 2FA Misconfiguration
DEF CON 29 Blue Team Village - Henry - How do you ALL THE CLOUDS
DEF CON 29 Cloud Village - Karl Fosaaen - Extracting all the Azure Passwords
Opening Note - Jayesh Singh Chauhan (DEF CON 29 - Cloud Village)