Previous Presentation
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes

DEF CON 27 talk

Next Presentation
DEF CON 27 - Phishing in the Cloud Era
DEF CON 27 - Phishing in the Cloud Era

DEF CON 27 talk