BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//fwd-cloudsec-2026//talk//8PYZSZ
BEGIN:VTIMEZONE
TZID:PST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T100000Z
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T110000Z
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-fwd-cloudsec-2026-8PYZSZ@pretalx.com
DTSTART;TZID=PST:20260602T113000
DTEND;TZID=PST:20260602T115000
DESCRIPTION:A security researcher submits a report. It looks small -maybe e
 ven trivial. But in cloud environments\, what starts as a whisper can beco
 me a roar that echoes across infrastructure you didn't know was connected.
 \n\nThis talk reveals what happens behind the scenes when vulnerability re
 ports reach cloud providers at scale. What makes cloud vulnerabilities uni
 que when distributed architectures are in play? How do you prioritize reme
 diation when you're working backwards from customer impact across services
  you don't directly control?\n\nThrough a real-world case study told from 
 both the researcher and practitioner perspective\, you'll see the crucial 
 trade-offs no one talks about publicly\, and a series of challenges that t
 extbook CVD was not designed to handle.\n\nAnd the challenge is growing. A
 I is accelerating the velocity of vulnerability discovery\, and the tradit
 ional vulnerability disclosure program (VDP) model was not built for it. T
 his talk introduces three principles for modern VDP: a framework for build
 ing programs that don't just survive scale\, but use it as a force multipl
 ier. \n\nWhether you're finding vulnerabilities or fixing them\, you'll le
 ave with practical strategies for navigating today's reality.
DTSTAMP:20260502T124500Z
LOCATION:Room 2
SUMMARY:Velocity of a Whisper: When One Vulnerability Cascades Across Cloud
  Infrastructure - Albin Vattakattu\, Ryan Nolette
URL:https://pretalx.com/fwd-cloudsec-2026/talk/8PYZSZ/
END:VEVENT
END:VCALENDAR
