Identity Attack Vectors
Morey J. Haber & Darran Rolls
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Adversary Emulation with MITRE ATT&CK
Drinor Selmanaj
Building Multi-Tenant SaaS Architectures
Tod Golding
Security and Microservice Architecture on AWS
Gaurav Raje
Zero Trust Networks
Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth
Cloud Native Security Cookbook
Josh Armitage