Today, we are at a time when cloud technologies are used predominantly. At this point, AWS meets most of its market share. The presentation will describe practical security methods for common services (EC2, S3, KMS, etc.) in AWS, hardening applications, and explanations of how security can be achieved by demonstrating how subdomains are hacked through security vulnerabilities involving user-based mistakes.
Topics: