What makes a cloud security breach? Misconfigurations, exposed APIs, cryptojacking, and more. Attacker motivations don’t change much, but their methods adapt to new technologies, so defenders must adapt too. This session will walk through nine examples of real cloud breaches, discuss what went wrong, why it was interesting, and what defenders can do to avoid ending up on such a list.