As businesses continue to move critical infrastructure to cloud environments, attackers are more motivated than ever to exploit cloud vulnerabilities. This session will cover five common cloud attack scenarios, show how attackers can steal credentials and escalate privileges while discussing techniques organizations can employ to defend against these attacks and fortify their cloud environments.