35% Off Finance Skills That Get You Hired - Code CFI35
Free courses from frontend to fullstack and AI
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how modern adversaries are exploiting security tools themselves as attack vectors in this 20-minute conference talk from AWS re:Inforce 2025. Discover why traditional security models are failing as attackers shift from bypassing defenses to directly exploiting them, targeting everything from control planes to misconfigurations in security infrastructure. Learn about the evolving threat landscape where security tools have become part of the attack surface, and understand how this paradigm shift has redefined threat exposure boundaries. Gain insights into why conventional approaches fall short in addressing these new vulnerabilities and examine practical strategies that CISOs must implement to identify hidden risks, strengthen their defensive posture, and maximize return on investment from security tools. Understand how attackers are finding and exploiting weaknesses in the very infrastructure designed to protect organizations, and discover actionable approaches to fortify defenses against these sophisticated attack methods.
Syllabus
AWS re:Inforce 2025 - Security tools are the new attack surface (TDR121)
Taught by
AWS Events