Overview
This workshop explores how security teams can move from theoretical cloud security models to practical trust hardening in real-world environments.
Across two intensive, hands-on sessions, Cyber Helmets and HackTricks Training collaborate to break down how trust actually fails in modern cloud infrastructures, across identities, pipelines, and Kubernetes, and how teams can harden it in practice using realistic scenarios and hands-on labs.
Rather than focusing on isolated misconfigurations, the workshop looks at trust relationships attackers exploit and how those weaknesses emerge in day-to-day cloud operations.
📅 19–20 February 2026
🕒 3pm–9pm CET
💻 Live online
🧪 Hands-on labs provided by HackTricks Training
Why you should attend
Many cloud security issues stem from how trust is designed and applied across identities, pipelines, and orchestration layers, not from a lack of tooling.
This workshop is designed for teams who want to move beyond configuration checklists and better understand how trust assumptions are introduced, where they break down, and how they are exploited in real-world cloud environments. Through guided discussion and hands-on labs, participants will work through realistic scenarios that reflect how modern cloud infrastructures are actually built and operated.
The focus is on hardening trust where it most often fails today, across identity and cloud least privilege, key management, CI/CD pipelines, and Kubernetes environments on AWS, Azure, and GCP.
Participants will get hands-on action with HackTricks Training labs and experience an intensive, hands-on workshop focused on practical skills they can apply beyond the lab environment.
Key Takeaways
- A clearer understanding of trust failure patterns in cloud and pipeline environments
- Practical skills for detecting and preventing cloud abuse scenarios
- Knowledge of secure key-management architecture and how to protect encryption workflows
- Tools and frameworks for CI/CD integrity and policy enforcement
- Hands-on experience applying defensive configurations to AWS EKS clusters
- Confidence in identifying and mitigating cloud pivoting behaviors
Meet the instructors
Work directly with field experts and learn how they approach real-world cloud security problems. Their combined experience informs both the labs and context of this workshop, ensuring you get practical insights grounded in real-world attack and defense scenarios.
![]() |
Carlos Polop
|
![]() |
Ignacio Dominguez
|
Join the workshop
Join us to explore, in action, how trust breaks across cloud infrastructure, CI/CD pipelines, and Kubernetes, and how to harden it in practice.
📅 19–20 February 2026
🕒 3pm–7pm CET | Live online
👉 View full details and join us here:

