Organizations are moving data and applications into public cloud services at a rapid pace. As the public cloud footprint expands, red teams and attackers are reinventing the kill chain in the cloud. Public cloud services provide new, creative ways to discover assets, compromise credentials, move laterally, and exfiltrate data. In this webcast, Eric Johnson (SEC510 and SEC540 author) explores common cloud attack techniques from the MITRE ATT&CK Cloud Matrix. For each technique, we will analyze misconfigurations, exploitation paths, and common architecture patterns for breaking the kill chain.