About
Cloud Village is an open space to meet folks interested in offensive and defensive aspects of cloud security. The village is home to various activities like talks, workshops, CTFs and discussions targeted around cloud services.
If you are a professional who is looking to gain knowledge on securely maintaining the cloud stack and loves to be around like-minded security folks who share the similar zeal towards the community, Cloud Village is the perfect place for you.
This year Cloud Village will be in-person at Moscone Center for RSA Conference 2026. We will be bringing in our amazing-as-always Capture the Flag Event on Cloud Security. Stay Tuned!
Hope to see you all there!
Schedule
+
9:30-11:30
LAB | Automated Security Posture and Vulnerability Management with AWS
+
Sponsored by: AWS
Speakers: Aliaksei Ivanou & Albin Vattakattu
Abstract:
Join AWS subject-matter experts for a deep dive into security posture and exposure management using Amazon Inspector and AWS Security Hub. Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. AWS Security Hub is a unified cloud security solution that prioritizes your critical security issues and helps you respond at scale. It detects critical issues by automatically correlating and enriching security signals from multiple sources, such as posture management (AWS Security Hub CSPM), vulnerability management (Amazon Inspector), sensitive data (Amazon Macie), and threat detection (Amazon GuardDuty).
Speaker Bio(s):
Aliaksei Ivanou, WW Security & Identity Sr. PSA at Amazon Web Services leads worldwide partner strategy and technical validation for critical security programs, driving innovation and scale across the global partner ecosystem. Specializing in security posture and exposure management, he guides partners in building enterprise security solutions that unify threat detection, vulnerability management, and automated response at scale.
Albin Vattakattu is a Security Engineer at Amazon Web Services (AWS), where he safeguards AWS’s global infrastructure and develops AI-based tools to improve risk management and drive cross-company efficiency. With over a decade of experience in network and application security, cryptography, and large-scale incident response, Albin led Emergency Response teams across the Americas. He defended numerous Fortune 500 companies and foreign governments against large-scale DDoS campaigns orchestrated by advanced persistent threats (APTs). He also holds a Master’s degree in cybersecurity from New York University along with multiple security certifications.
+
11:00-13:00
LAB | Agentic AI Supply chain Vulnerability lab
+
Venue: Cyber Starter Lounge
Speaker: Aamiruddin Syed
Abstract:
AI agents are no longer simple chatbots they autonomously execute code, call external APIs, and make decisions across complex workflows. But what happens when the tools they trust are compromised?
This hands-on workshop explores ASI04: Supply Chain Vulnerabilities from the OWASP Top 10 for Agentic Applications (2026). Participants will attack a deliberately vulnerable AI agent system to understand how adversaries exploit the trust agents place in their dependencies.
Through five progressive challenges, attendees will:
-Install typosquatted packages that exfiltrate secrets on import
-Exploit a trojanized MCP (Model Context Protocol) server masquerading as legitimate tooling
-Execute dependency confusion attacks against "internal" packages
-Discover hidden prompt injections buried in tool descriptions
-Poison RAG knowledge bases to manipulate agent behavior
Each attack demonstrates a real-world vector currently affecting production AI systems. Participants will observe exfiltrated data in real-time on an attacker dashboard, making abstract threats tangible.
Key Takeaways:
Hands-on experience exploiting AI supply chain vulnerabilities
Understanding of OWASP's agentic AI threat landscape
Practical detection and mitigation strategies
Portable lab environment for continued learning
No prior AI/ML security experience required. Participants leave with the complete lab to continue practicing.
Speaker Bio:
Aamiruddin Syed is a Cybersecurity Professional with over a decade of experience specializing in DevSecOps, Shift-Left Security, Cloud Security, and Internal Penetration Testing. He is the OWASP Agentic AI Supply Chain Project Co-Lead and active contributor to the CSA Agentic AI initiative.
He authored Supply Chain Software Security – AI, IoT, Application Security (Apress/Springer) and has deep expertise in automating security in CI/CD pipelines, infrastructure as code, and cloud hardening. He routinely conducts internal security assessments of critical systems and is known for bridging the gap between security and engineering teams to embed security directly into products.
As recognized advocate for secure development, he is a frequent speaker and session chair at leading industry conferences including RSA Conference, DEFCON, and Black Hat. In 2024, he was honored with the Impact Award for Professional Excellence in Dubai.
+
11:30-12:05
̶T̶A̶L̶K̶ ̶|̶ ̶O̶n̶e̶ ̶M̶o̶u̶n̶t̶ ̶t̶o̶ ̶R̶u̶l̶e̶ ̶T̶h̶e̶m̶ ̶A̶l̶l̶:̶ ̶F̶r̶o̶m̶ ̶S̶t̶o̶r̶a̶g̶e̶ ̶P̶o̶d̶ ̶t̶o̶ ̶C̶l̶u̶s̶t̶e̶r̶ ̶A̶d̶m̶i̶n̶ CANCELLED
+
Speakers: Shaul Ben Hai & Idan Nagar
Abstract:
Container Storage Interface (CSI) drivers are the backbone of persistent storage in Kubernetes. They run as privileged DaemonSets on every node, trusted by cloud providers and cluster administrators alike. But what happens when these trusted components get compromised, or expose more than they should?
In this talk, we reveal a systemic vulnerability pattern affecting CSI driver implementations across major cloud providers. Through independent research, we discovered an architectural flaw in managed Kubernetes that breaks the expected security boundaries between storage infrastructure and cluster credentials. The same pattern appeared in AWS EKS, Google GKE, and Azure AKS - raising questions about industry-wide assumptions in CSI driver design.
We will show how this architectural flaw exposes:
Service account tokens for ALL pods on the node
Kubelet credentials and private keys
A direct path from storage pod to cluster-admin
We will demonstrate:
The "Node to Cluster Admin" attack pattern
How a single overpermissioned mount breaks Kubernetes security boundaries
Live attack chains showing credential theft to cluster compromise
Techniques attackers use to pivot through storage infrastructure
Interestingly, cloud vendors responded differently to identical findings - sparking a debate about security boundaries in managed Kubernetes. Is this a vulnerability or expected behavior? We'll share our perspective and let you decide.
Attendees will learn:
How to audit CSI drivers in their own clusters
The minimal hostPath mounts CSI drivers actually need
Detection strategies using runtime security tools
Why "privileged by design" shouldn't mean "access to everything"
Whether you're a cloud security engineer, red teamer, or platform architect, you'll leave with actionable insights to secure your Kubernetes storage layer.
Speaker Bio(s):
Shaul Ben Hai is a Senior Staff security researcher at SentinelOne, focusing on Cloud ecosystem.
Shaul is researching vulnerabilities in k8s for half a decade, building innovative solutions that improve Cloud Attack Chain solutions at SentinelOne.
Idan Nagar.Idan is a Staff Security Researcher at SentinelOne focused on K8S and malware, helping secure cloud and container environments. idan.nagar@sentinelone.com
+
12:05-12:40
PANEL | Modern Trust Boundaries: LLMs, Identity, and Supply Chain Risk
+
Panelists: Mark Vaitsman, Chris Hosking, Swapnil Deskmukh
Panel Bio(s):
Mark Vaitzman
Mark Vaitzman is a Security Research Team Leader at Varonis, a leader in data security. As a passionate cybersecurity expert, Mark holds extensive experience in leading security threat and research teams in various cybersecurity companies, analyzing emerging threats, incident response and developing innovative solutions. He is also a lecturer at Cyber Security College, sharing his knowledge and shaping the next generation of cybersecurity professionals. Mark previously presented at CrestCon, DeepSec, and Black Hat USA. In his free time, he likes sailing in the sea and riding a motorcycle.
Chris Hosking
Chris Hosking is SentinelOne’s AI & Cloud Security Evangelist, based in London, with a deep passion for all things cloud security. He regularly speaks on the evolving nature of AI-powered attacks, the security challenges facing teams building with AI, and the realities of cloud and container breaches—alongside a candid view on why today’s cloud security tooling, while more powerful than ever, still falls short.
With over a decade of experience in cybersecurity, Chris has helped organisations of all sizes adopt, scale, and secure cloud technologies with confidence. Before joining SentinelOne, he built his career in Australia, holding roles at CrowdStrike, Trend Micro, and Progress Software (Chef, Telerik).
Having worked across diverse regions and cultures, Chris brings a global perspective to cybersecurity, focused on keeping AI-driven and cloud-native environments resilient in the face of modern threats.
Swapnil Deskmukh
Swapnil is the CTO and co-founder of Certus Cybersecurity, where he serves as a trusted advisor to Fortune 100 clients and oversees the technical delivery of our security services. Prior to Certus, he led the entire application security practice as a senior director at Visa. A recognized expert, he co-authored the "Hacking Exposed" Series and has a top-ten ranking in bug bounty programs for Verizon Media and the US government.
+
12:40-13:15
TALK | Closing the Cloud Incident Response Gap
+
Speaker: Erblind Morina
Abstract:
In this talk, I present real-world cloud incident response through the lens of IBM X-Force Incident Response investigations, highlighting how threat actors compromise modern cloud environments. The session begins with war stories illustrating attacks across common cloud environments, spanning infrastructure and workloads, as well as complex hybrid cloud scenarios where threat actor pivot between on-premises systems and cloud, exploit trust boundaries, and maintain persistence. These cases provide insight into adversary TTPs and attack vectors.
The main part of the session covers the core challenges facing cloud IR teams. These include missing or incomplete audit logs, short retention periods, gaps in detection coverage, limited telemetry and visibility into cloud and container control planes, and inconsistencies across providers and platforms. Real-world examples demonstrate how these gaps allow attackers to operate undetected, slow investigations, and complicate evidence collection. The talk emphasizes the importance of preparing environments through enabling logging, exporting telemetry, activating security detections, and integrating threat intelligence feeds, as well as establishing standardized IR workflows. This section provides actionable guidance for identifying blind spots, improving situational awareness, and strengthening posture across cloud, multi-cloud and hybrid environments.
To help close the cloud IR gap, I introduce a tool I built called AWSACS, which evaluates AWS environments for visibility and logging coverage and reports gaps that may hinder forensic evidence collection or IR investigations. AWSACS identifies which critical logs and security services, such as GuardDuty, CloudTrail, and Config, are enabled or missing, helping teams understand visibility gaps across their AWS environment.
The session concludes with a live demonstration of AWSACS in AWS. The war stories presented cover AWS, Azure, and GCP, including DevOps components such as Kubernetes, highlighting real-world cloud compromises and challenges. The demo shows how the tool can be used to assess visibility, detect missing logs and enabled security controls, and help teams close the cloud IR gap by identifying gaps and improving readiness in real environments.
Speaker Bio:
IBM X-Force Principal Incident Response Consultant and EMEA Cloud Incident Response Lead, with 7+ years of experience in Security Operations, specializing in incident response and threat intelligence. Has extensive experience in the banking sector, serving as an Incident Responder, Detection Engineer, and SOC Manager within a global Security Operations Center, and has successfully handled multiple high-impact security incidents, including APT-level investigations.
Leads initiatives to build and mature IR capabilities, develop threat intelligence platforms, and deliver technical training. Holds industry-recognized certifications including GIAC Cyber Threat Intelligence (GCTI), GIAC Certified Forensic Analyst (GCFA), and GIAC Cloud Forensics Responder (GCFR). Holds a Bachelor’s degree in Security Studies, is pursuing a Master’s in Cybersecurity, and is a Chevening Fellow at the UK Defence Academy.
+
13:15-15:15
LAB | Ransomware Actors Living Off the Land: From VPN Login to Domain Collapse
+
Sponsored by: TrendAI
Speakers: Chris LaFleur, Paul Caron, Ailsa Wood
Abstract:
Join experts from Trend AI and S-RM for a live, hands-on hybrid workshop inside an Immersive Cyber Range. Watch a realistic enterprise environment fall from a single-factor VPN compromise to full domain control—entirely through Living-Off-the-Land (LOTL) techniques.
No exploit kits. No custom tools. Just native Windows binaries, legitimate remote management utilities, and built-in AD functionality.
You will actively investigate each phase, hunt the artifacts in real logs/EDR views, see the exact attack commands, then learn tool-agnostic detection and response strategies that work whether you have a full EDR stack or only Event Viewer and PowerShell.
Leave with immediately actionable playbooks for identity hardening, behavioral monitoring, and where to break the kill chain before ransomware deploys.
Learning Objectives By the end of the session participants will be able to:
1. Map the full LOTL ransomware progression (VPN → Recon → Privilege Escalation → Lateral → DC takeover → Persistence → Exfil → Impact).
2. Identify behavioral Indicators of Attack (IoAs) vs. static IOCs in any environment.
3. Execute quick manual hunts or tune EDR queries for the most common LOTL TTPs.
4. Prioritize high-impact controls (MFA everywhere, admin tiering, logging baselines, PAWs) that actually stop these attacks.
Pre-requisites: Bring a laptop with admin access and unfiltered internet
Speaker Bio(s):
Chris LaFleur
Chris LaFleur is a cybersecurity leader specializing in digital forensics and incident response (DFIR), with over 18 years of experience helping organizations respond to and recover from cyberattacks. At TrendAI, he focuses on expanding the Vision One ecosystem across incident response firms, MSSPs, and global partners. Chris has built and led international IR teams responding to major ransomware incidents and works closely with security leaders to strengthen cyber resilience and risk management strategies.
Paul Caron
Paul is S-RM’s Global Managed Services Lead & Head of Cybersecurity, Americas. Paul has over 20 years of experience spanning both the private and government sectors in roles across leadership, military intelligence and counterterrorism, and cyber security leadership & engagement delivery. Before joining S-RM, he was the Managing Director of Incident Response for a global consulting firm. In this role, he used his experience to help clients who were experiencing complex ransomware attacks.
After a career in the U.S. Army, where he was a subject matter specialist in various facets of the Intelligence and Special Operations fields, Paul joined PwC. At PwC, he was an engagement manager and focused on cyber security strategic transformation projects. He has significant experience advising Fortune 100 clients through proactive security transformation efforts and post-breach remediation activities. He has a strong track record of partnering with senior security leaders to mature their cyber security programs on their strategic journeys.
Paul holds an MBA from Norwich University. He was in the first graduating class of the Norwich University Strategic Studies and Defence Analysis program. He is also the co-author of “Security Supervision and Management: Theory and Practice of Asset Protection.”
Ailsa Wood
Ailsa Wood is a Technical Manager in S‑RM’s Cyber Incident Response division. After joining the London team in early 2022 and transitioning to the Americas practice in 2025, Ailsa now leads strategic and operational direction across the Incident Response function. In this role, she focuses on shaping capability development, strengthening operational resilience, and guiding teams through complex cyber events.
With more than nine years of experience in incident response and digital forensics, Ailsa brings deep technical expertise alongside a leadership mindset. She has overseen and advised on a wide range of cyber investigations — including ransomware attacks, network intrusions, and insider threat matters — supporting clients across sectors such as finance, healthcare, technology, and government.
Ailsa is known for combining technical depth with clear, pragmatic leadership, ensuring that clients and teams are equipped to navigate high‑pressure cyber incidents with confidence.
Cloud Village CTF
CTF start - 9:30 AM PT, 24 March 2026
CTF close - 12:00 PM PT, 26 March 2026
CTF Registration - cloudvillagectf.trendaisecurity.com
Cloud Village is coming to RSA Conference 2026
Explore the Cloud Village at RSAC 2026 Conference! Meet the researchers and practitioners exploring the offensive and defensive sides of cloud security. Learn how attacks unfold, see how defenders respond, and sharpen your skills with hands-on, cloud-focused activities.
Visit the Cloud Village at RSAC™ 2026 Conference from March 24–26, and join talks, labs, and a continuous three-day cloud CTF.
Register today using code 36UCLDVLGXPD to save $100 on your RSAC™ 2026 Expo Plus Pass!
Our sponsors at
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects 500,000+ organisations and 250+ million individuals across clouds, networks, devices, and endpoints. Know More
Varonis protects the data where it lives. Their platform is purpose-built to look deeply inside and around data—and then automate its protection using patented, battle-hardened machine learning and AI. Know More
Amazon Web Services is the world’s most comprehensive and broadly adopted cloud, enabling customers to build almost anything they can imagine. They offer the greatest choice of innovative cloud and AI capabilities and expertise, on the most extensive global infrastructure, with industry-leading security, reliability, and performance. Know More
Aikido have category-leading security products across code, cloud, runtime, and autonomous penetration testing.
What makes them even stronger is context. By connecting code, cloud, and runtime data, their products work together to find the right issues and fix them faster. Know More
Prowler builds open, adaptable, and community-driven solutions that empower security teams to stay ahead. Prowler stands at the forefront of this transformation. They offer an open-source, highly configurable security platform that empowers organizations to tailor their security assessments and monitoring strategies. Know More

.png)
.png)
.png)

