top of page

CLOUD VILLAGE @BSidesCharm 2026

Cloud Village is an open space to meet folks interested in offensive and defensive aspects of cloud security.

About

Cloud village is an open space to meet folks interested in offensive and defensive aspects of cloud security. The village is home to various activities like talks, workshops, CTFs and discussions targeted around cloud services.

If you are a professional who is looking to gain knowledge on securely maintaining the cloud stack and loves to be around like-minded security folks who share the similar zeal towards the community, Cloud Village is the perfect place for you.

This year Cloud Village will be in-person at 
Sheraton Baltimore North, Townson, Maryland for BSidesCharm 2026. We will be bringing in our amazing-as-always Capture the Flag Event on Cloud Security. Stay Tuned!

Hope to see you all there!

Schedule

+

11:00-13:00

LAB | AWS Foundational Governance & Risk Management Workshop

+

Sponsored by: AWS


Speaker: Jerry Jones IV


Abstract:


This workshop covers core AWS security concepts through practical, guided exercises. You'll gain experience with the most important AWS security services while learning how to establish compliance monitoring and audit logging frameworks while operating on AWS.


Speaker Bio:


Jerry Jones IV is an Associate Delivery Consultant – Security at Amazon Web Services, where he specializes in helping customers architect and implement secure, compliant cloud solutions. With extensive experience spanning federal cybersecurity, cloud security architecture, and AI/ML implementations, Jerry brings a unique perspective on building resilient systems that meet rigorous regulatory requirements. 

Prior to joining AWS, Jerry served as an Information System Security Officer at the U.S. Department of Education, where he led complex Authorization to Operate (ATO) efforts for mission-critical systems, successfully navigating the transition from NIST 800-53 rev4 to rev5 and managing cybersecurity operations for systems with budgets exceeding $5 million. His federal service also includes roles at the Federal Deposit Insurance Corporation, where he administered the agency's Cyber Security Assessment and Management (CSAM) tool and guided authorization efforts across 19 diverse divisions, and the U.S. Department of Agriculture, where he contributed to cloud migration strategies and high-value asset protection. 

Jerry's technical expertise spans cloud architecture, security automation, and AI/ML integration. He has designed and deployed enterprise-grade solutions including centralized backup and logging strategies for AWS Organizations, multi-account governance frameworks, and automated security baselines that ensure consistent compliance across distributed environments.


+

14:00-14:20

LIGHTNING TALK | Good Intentions, Bad Exploits: The AWS Vulnerability Lifecycle Explained

+

Speakers: Albin Vattakattu & Ryan Nolette


Abstract:


Cloud services power nearly every digital experience today. As these services become increasingly critical to our customers' operations, identifying and responsibly disclosing vulnerabilities is essential to maintaining their trust. This session examines how we approach security research in cloud environments, from initial discovery through coordinated disclosure and customer protection. 


We'll walk through the complete lifecycle: how security researchers evaluate cloud services for vulnerabilities, what makes cloud security research unique compared to traditional software testing, and how we work backwards from customer impact to prioritize remediation. You'll see real-world examples of vulnerabilities discovered in AWS services, understand what makes a high-quality security report, and learn how we balance transparency with giving organizations time to protect their customers. 


Key topics include the research methodology for cloud environments, Coordinated Vulnerability Disclosure (CVD) best practices, how AWS prioritizes and remediates findings, embargo period management, and our partnership approach with the security research community. This session demonstrates our commitment to security as job zero and shows how collaboration with researchers helps us better serve and protect our customers.


Speaker Bio(s):


Albin Vattakattu


Albin leads the global Vulnerability Disclosure Program (VDP) for Amazon Web Services (AWS). With over a decade of expertise in large-scale network and application security, he previously spearheaded incident response teams across North and South America. Albin holds a Master’s degree in cybersecurity from New York University (NYU) and maintains multiple industry-leading certifications.


Ryan Nolette


Ryan is AWS's Senior Security Engineer for the Outreach Team and CoAuthor of AWS Detective. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With almost 2 decades in the infosec field, Ryan has been on the development and operations side of companies such as Postman, Sqrrl, Carbon Black, Crossbeam Systems, SecureWorks and Fidelity Investments. Ryan has been an active speaker and writer on threat hunting and endpoint security. 



+

14:20-14:55

TALK | Signing Your Agent's Homework: Cryptographic Trust for AI Agent Approvals

+

Speakers: Angad Mehata, Bhagavan Bollina & Jainil Malaviya


Abstract:


Human-in-the-loop approval is the primary safety control for enterprise AI agents. When an agent requests permission to delete files or run queries, we trust that what we approve will execute. This assumption is wrong.


This talk exposes TOCTOU (Time-of-Check to Time-of-Use) vulnerabilities in agent approval workflows. We demonstrate how attackers can modify agent actions after user approval but before execution, causing unauthorized operations even with human oversight.


We introduce agent-action-trust, an open-source library that cryptographically binds approvals to actions using content hashing and digital signatures. If an action is modified after approval, execution is automatically blocked.


Speaker Bio(s):


Angad is a security practitioner focused on AI Agent identity system security.


+

14:55-15:30

PANEL | Securing the AI Data Plane: Shadow AI, Identity Sprawl, and Exposure at Machine Speed

+

Panelists: TBD, TBD, TBD

+

15:30-16:05

PANEL | Modern Cloud Defense: Identity, Runtime, and Control Planes in a Multi-Cloud World

+

Panelists: TBD, TBD, TBD

+

16:10-18:00

LAB | Breaking “Vibe Coding” Workshop

+

Speaker: Marc Raphael


Abstract:


As we move from chatting with AI to letting AI do things for us, a trend known as Vibe Coding, the security stakes have never been higher. When we give an AI agent the power to run commands on a computer, we are giving a digital intern a master key to our systems. If that intern is easily tricked, your data is at risk.

This beginner friendly, hands-on workshop is a laboratory for the curious. We will build a simple autonomous agent that can read files and act on its own. Then you will learn the dark art of Indirect Prompt Injection to see how easy it is to hijack an agent and turn it against its owner. Finally we will switch to defense. We will show you how to build digital cages and guardrails to keep your AI assistants helpful and harmless. No advanced coding or AI background is required. Just bring a laptop and an inquisitive mind.


Pre-requisites:


Security beginners, IT professionals, and curious developers.  No prior AI experience is necessary. 

A laptop with a web browser.

Access to a cloud based LLM tool or local equivalent.

Basic understanding of how to create a text file.


Speaker Bio:


Marc Raphael is a Cybersecurity Architect and the founder of 911Cyber, a firm specializing in high stakes incident response. Over the last three years, he has led the integration of AI agents into modern Security Operations Centers to automate complex defense tasks. Through this frontline experience, he has witnessed firsthand how autonomous agents can be compromised to wreak havoc on an organization’s infrastructure.

By combining his background in traditional incident response with cutting edge AI orchestration, he provides a unique perspective on the "execution gap" in agentic security. He is dedicated to helping organizations adopt AI automation without sacrificing their security posture.


Cloud Village CTF
 

CTF start - TBA

CTF close - TBA

Register at - TBA


 

If you ever wanted to break stuff on the cloud, or if you like rabbit holes that take you places you did not think you would go to, follow complicated story lines to only find you could have reached to the flag without scratching your head so much - then this CTF is for you!

Our CTF is a contest where we have a bunch of challenges hosted across multiple Cloud providers across multiple categories of difficulty.

See you on the other side!

Our sponsors at

TrendAI-Logo-CMYK.ai (1).png

DIAMOND SPONSOR
(ANNUAL)

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects 500,000+ organisations and 250+ million individuals across clouds, networks, devices, and endpoints. Know More

Logo_VTL_202403_1200w_White (1).png

DIAMOND SPONSOR
(ANNUAL)

Varonis protects the data where it lives. Their platform is purpose-built to look deeply inside and around data—and then automate its protection using patented, battle-hardened machine learning and AI. Know More

ai to png (1).png

DIAMOND SPONSOR
(ANNUAL)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud, enabling customers to build almost anything they can imagine. They offer the greatest choice of innovative cloud and AI capabilities and expertise, on the most extensive global infrastructure, with industry-leading security, reliability, and performance. Know More

Logo-Core-FullColorInverted-Large.png

PLATINUM SPONSOR
(ANNUAL)

Aikido have category-leading security products across code, cloud, runtime, and autonomous penetration testing.
What makes them even stronger is context. By connecting code, cloud, and runtime data, their products work together to find the right issues and fix them faster. 
Know More

bottom of page