Register for the webinar
Register here
Register to watch on-demand
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage
Your Hybrid Attack Expert

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET
Webinar
Your Hybrid Attack Expert
On-demand Webinar

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET
Your Hybrid Attack Expert

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET

Enhancing AWS Control Plane Security using AI/ML Detection and Response Models

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale.

30 minutes
July 10, 2024
11am ET | 5pm CET
Register for a free webinar
Register for a free on-demand webinar
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale. As enterprises enjoy adopting Public Cloud infrastructures for Speed and Scalability, as do attackers. Discover how cybercriminals will abuse Control Planes of Public Clouds to run jailbreak techniques, compromise more identities, and conduct recon and discovery in a matter of minutes.

Our seasoned attack lab security engineer will provide a comprehensive understanding of attack methodologies and defense strategies. and most importantly, highlight the ways SOC teams can detect, disarm and disrupt these attacks.

What you will learn in this session:

  • Explore Attack Scenarios in AWS: Discover how attackers operate in the Cloud Control Plane from initial compromise to lateral movement and exfiltration, with real-world examples
  • Simulate Attack Paths: Through a demo, dive into an emulated cyberattack in AWS providing a comprehensive understanding of attack methodologies categorized by MITRE ATT&CK tactics.
  • Detect Attacks targeting AWS Control Plane: Implement detection strategies based on the insights gained from analyzing attack paths.
Share

Summary

In this live session, we delve into the crucial topic of modern Cloud Control Plane threat models, specifically how attackers harness the power of API and services to execute their attacks at even greater speed and broader scale. As enterprises enjoy adopting Public Cloud infrastructures for Speed and Scalability, as do attackers. Discover how cybercriminals will abuse Control Planes of Public Clouds to run jailbreak techniques, compromise more identities, and conduct recon and discovery in a matter of minutes.

Our seasoned attack lab security engineer will provide a comprehensive understanding of attack methodologies and defense strategies. and most importantly, highlight the ways SOC teams can detect, disarm and disrupt these attacks.

What you will learn in this session:

  • Explore Attack Scenarios in AWS: Discover how attackers operate in the Cloud Control Plane from initial compromise to lateral movement and exfiltration, with real-world examples
  • Simulate Attack Paths: Through a demo, dive into an emulated cyberattack in AWS providing a comprehensive understanding of attack methodologies categorized by MITRE ATT&CK tactics.
  • Detect Attacks targeting AWS Control Plane: Implement detection strategies based on the insights gained from analyzing attack paths.
Share

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Your Hybrid Attack Expert

Francis Ia
Host
Senior Security Engineer at Vectra AI

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

FAQs

Who should join the hunt?

This competition is open to all threat hunters. This is a more advanced challenge, so experience with threat hunting and investigation will set you up for success!

How long does it take to complete? Do I need to finish it in one session?

The challenge will take approximately 10 hours to complete. You can log in at any time during the 4 weeks of the challenge and pick up right where you left off.

How does scoring work?

The objective is to collect as many points as possible. Points will accumulate on the Scoreboard.

This is a jeopardy-style format. The higher the points available – the harder the challenge. Some challenges unlock additional challenges to capture more points. Most challenges do offer hints, but hints will cost you points.

Can I invite others to join?

Yes! Invite your colleagues to join in on the fun. The challenge is open to threat hunters around the world and everyone has a chance to win.