Today’s cloud environments are large, multi-faceted, and dispersed. They have a myriad of options for selection, configuration, security, and functionality. Add on more than one of these environments (AWS, GC, Azure, Oracle, Digital Ocean, etc) and the number of potential issues skyrocket! If you have custom applications, developers, databases, and any of the hundreds of other common items in your arena, your chances of having exposed vulnerabilities becomes almost inevitable. Watch as we discover, attack, and plunder a typically configured cloud environment, all while providing you with ways to discover and protect your own environments.