fwd:cloudsec Europe 2024

The speaker’s profile picture
Attila Dulovics

My name is Attila, a security engineer who is a fan of codified solutions which aim to reduce the burden of the users by helping them to configure things easier and safer. My current day to day focus is mostly around Cloud Security and Cloud IAM problems . In my free time I like doing strength training, hiking, and practicing inline skating tricks at skateparks.

  • GCP and AWS identity federation - lessons learned from the field as well as cross-cloud forensics and incident response.
The speaker’s profile picture
Chris Farris

Chris is a grumpy old cloud troll.

  • Introduction
The speaker’s profile picture
Chris Norman

Chris is the cofounder of Common Fate and the creator of Granted, an open-source CLI for accessing AWS.

  • Build Your Own CloudTrail
The speaker’s profile picture
Christian Philipov

Chris is a principal security consultant and heads up the Cloud Security capability area within WithSecure Consulting. As part of his day to day he leads the global team that deals with various different types of engagements of both a transactional and more bespoke nature. Chris specialises in Microsoft Azure predominantly with GCP and AWS as an additional background.

  • Staying Sneaky in Microsoft Azure
The speaker’s profile picture
Karim El-Melhaoui
  • Introduction
The speaker’s profile picture
Katie Knowles

Katie Knowles is a Security Researcher at Datadog, focused on Azure research. Through her past roles, Katie has had the chance to approach security as both an attacker and defender, from incident response and detection engineering to penetration testing. She holds Azure (AZ-104, AZ-500) and offensive security (OSCP, GPEN) certifications.

  • Hidden in Plain Sight: (Ab)using Entra's AUs
The speaker’s profile picture
Kat Traxler

Kat Traxler is the Principal Security Researcher at Vectra AI focusing on abuse techniques and vulnerabilities in the public cloud. Prior to her current role, she worked in various stages in the SDLC performing web application penetration testing and security architecture design for Web, IAM, Payment Technologies and Cloud Native Technologies.

Kat’s research philosophy directs her work to where design flaws and misconfigurations are most probable. This guiding principle leads her research to the intersection of technologies, particularly the convergence of cloud security and application security and where the OS-layer interfaces with higher-level abstractions.

Kat has presented at various conferences including the SANS CloudSecNext Summit and fwd:CloudSec on topics such as privilege escalation in GCP, and bug-hunting in the cloud. In addition to her work at Vectra AI, she is a member of IAN Faculty and the Lead Author of the SANS SEC549 - Enterprise Cloud Security Architecture and currently holds multiple GIAC certifications. You can find her on the internet as @nightmareJS

  • Service Agents and the Search for Transitive Access in GCP
The speaker’s profile picture
Marcus Hallberg

My name is Marcus, a security engineer at heart, and I work for Spotify in Stockholm, Sweden. I spend my time with a mix of detection and response as well as cloud security where my passion is in forensics and automation. When I have time off I enjoy rock climbing, folk dancing and cross-country skiing.

  • GCP and AWS identity federation - lessons learned from the field as well as cross-cloud forensics and incident response.
The speaker’s profile picture
Nick Frichette

Nick Frichette is a Staff Security Researcher at Datadog, where he specializes in offensive AWS security. He is known for finding multiple zero-day vulnerabilities in AWS services and regularly publishing on new attack techniques. In addition to his research, Nick is the creator and primary contributor to Hacking the Cloud, an open source encyclopedia of offensive security capabilities for cloud environments. He is also a part of the AWS Community Builder Program, where he develops content on AWS security.

  • Hidden Among the Clouds: A Look at Undocumented AWS APIs
The speaker’s profile picture
Rami McCarthy

Rami is a bit of a security wonk. Most recently, he helped build the Infrastructure Security program at Figma. Before that, he worked as a security consultant and helped scale security for a health-tech unicorn. He writes about security over at ramimac.me and for tldrsec.com.

  • How to 10X Your Cloud Security (Without the Series D)
The speaker’s profile picture
Ryan Nolette

Ryan is AWS's Senior Security Engineer for the Outreach Team and CoAuthor of AWS Detective. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With almost 2 decades in the infosec field, Ryan has been on the development and operations side of companies such as Postman, Sqrrl, Carbon Black, Crossbeam Systems, SecureWorks and Fidelity Investments. Ryan has been an active speaker and writer on threat hunting and endpoint security.

  • www.linkedin.com/in/cloudy-with-a-chance-of-security
  • https://github.com/sonofagl1tch
  • Doing bad things for the right reasons: A look at the AWS vulnerability disclosure and remediation process
The speaker’s profile picture
Sebastian Walla

Sebastian Walla is an expert for Cloud Threat Intelligence. He is the deputy manager of the Emerging Threats team focusing on Cloud Threat Intelligence at CrowdStrike. Since 4 years Sebastian worked as a reverse engineer and has been focusing on cloud intrusions for a couple of years.
Sebastian studied Cybersecurity, has a Masters in Computer Science, and published a paper on automatically identifying and exploiting tarpit vulnerabilities to fight malware. He further holds the GREM and GCLD certification and presented at Euro S&P 2019 and Fal.Con 2023.

  • Cloud-Conscious Tactics, Techniques, and Procedures (TTPs) – An Overview
The speaker’s profile picture
Shay Berkovich
  • Kubernetes Audit Log Gotchas
The speaker’s profile picture
Shelly Raban

Shelly is a Senior Security Researcher at Tenable, specializing in cloud security research. In her previous roles, Shelly worked as a security researcher and threat hunting expert at Hunters. With 7 years of experience in cybersecurity, Shelly has conducted extensive research in detection engineering, host forensics, malware analysis, and reverse engineering. Outside of work, Shelly loves spending time with her two baby cats.

  • Who Watches the Watchmen? Stealing Credentials from Policy-as-Code Engines (and beyond)