Build to Hack, Hack to Build Phishing in the cloud era Mining Malevolence: Cryptominers in the Cloud Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Sentinel using Sysmon and MITRE ATT&CK Battle in the Clouds - Attacker vs Defender on AWS Your Blacklist is Dead: Why the Future of Command and Control is the Cloud Scaling Security in the Cloud With Open Source Pragmatic Cloud Security Automation Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid Keynote - Cloudy Vision: How Cloud Integration Complicates Security