In this session we will examine the most effective and dangerous attacks to the cloud, infrastructures, source code, scripts, protocols, configurations and more, no holds barred. We will see how a hacker thinks, creates his attacks and how he performs them. For each attack we will see the best defense and the prevention. A practical session full of invaluable information for every corporate asset and professional.
source