Live AWS Privilege Escalation Attacks and the Controls That Actually Stop Them

See real AWS attack paths executed live by independent researchers, including new AI-driven Bedrock and AgentCore exploits, and learn why most cloud environments remain fully vulnerable.

AWS Privilege Escalation Still Works. Period.

Sixteen real AWS privilege escalation attacks were tested by independent researchers. Every one succeeded in a standard AWS environment, without zero-days or exotic misconfigurations.

In this webinar, you will see several attacks executed live, then watch what actually stops them.


Live AWS Attack Simulations (No Theory)

Watch independent security researchers execute real AWS privilege escalation paths in real time, then see the same attacks fail when preventative controls are enforced.

  • IAM privilege escalation chains
  • Service-based lateral movement (Lambda, SSM, Elastic Beanstalk)
  • AI-driven escalation using Bedrock and AgentCore


Who should attend

  • Cloud Security Operations
  • Cloud Platform and Infrastructure Security
  • IAM and Cloud PAM teams
  • Security Architects responsible for AWS

Not a Fit If

You are looking for a high-level overview or a product marketing demo.

Date
Feb 10, 2026
Time
1:00 PM ET
Duration
45 Minutes

Meet Your Speakers

Nigel Sood

Nigel Sood

Cloud Privilege Threat Researcher

Sonrai Security

Eats new AWS Permissions for breakfast

Expert Speaker
Julian B

Julian B.

Penetration Tester

Software Secured

Hunted down dozens of novel CVEs in IoT and apps

Expert Speaker

Register now

  • Instant confirmation email
  • No spam, unsubscribe anytime

By registering, you agree to receive webinar updates and marketing emails. You can opt-out at any time.

What You Will Learn in 30 Minutes

Live AWS Attack Simulations (No Theory)

1

The exact AWS permissions attackers chain to escalate privileges

______________

Unique privileges that rated for sensitivity by our research team

2

How service-based attacks bypass identity-only controls

______________

And why permissions-level control is required

3

Why AI services like Bedrock introduce new confused deputy risks

______________

New IAM implications of both ends of the AI spectrum: the agent and the infrastructure

4

Which controls stop escalation before damage occurs

______________

And how to reproduce these attack paths in your own test environment

Watch our last session

New to our webinars? Check out our last session, Shift Left is a Dead End for Cloud Identity Security

Register now

Get exclusive SCP templating and policy generation strategies to stop this ongoing attack