BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.troopers.de//tr26-cfp//speaker//7VUXDP
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-tr26-cfp-RRYVJ3@cfp.troopers.de
DTSTART;TZID=CET:20260624T181500
DTEND;TZID=CET:20260624T184500
DESCRIPTION:There are many attacks\, new and old\, arising from the push to
  GenAI. In a world that encourages developers to adopt coding agents\, and
  is shifting to AI enabled workflows\, we must ask ourselves – are we ha
 ndling the new security risks this introduces? \n\nAmazon Bedrock is alrea
 dy being utilized across the board in all stages\, from the development li
 fecycle up to production applications\, with broad permissions over AWS re
 sources. The rapid growth of Bedrock usage reproduces common configuration
  patterns that lead to data leaks\, destruction\, and tampering.  \n\nIf y
 ou are interested in learning about novel attack methods against Bedrock a
 pplications across your AWS organization\, this talk is for you. You will 
 learn how common misconfigurations in Bedrock can lead to data exfiltratio
 n\, lateral movement\, and security control weakening in your AWS organiza
 tion. Join us to hear more.
DTSTAMP:20260510T025658Z
LOCATION:Track 3
SUMMARY:Novel attack techniques targeting the underlying infrastructure of 
 Bedrock applications - Maya Parizer
URL:https://cfp.troopers.de/tr26-cfp/talk/RRYVJ3/
END:VEVENT
END:VCALENDAR
