The document discusses securing clouds and some of the security challenges with cloud computing. It begins with an introduction of the presenter and their background. Several examples of common security issues with cloud environments are demonstrated, such as exposed credentials, open S3 buckets, and exposed EC2 services. The presentation emphasizes the importance of credentials and understanding cloud resources. It concludes that the most secure environment is one with the best understanding of deployed resources.