Security BSides San Francisco
So You Think You Can Secure Your Cloud - Red Team Engagements in GCP
Comprehensive guide to adversary simulations in GCP, covering initial access, persistence, privilege escalation, C2 using Google products, and data exfiltration techniques.