Architecting Cloud Security Testing in the GenAI Era
- Date:
- June 18, 2025
- Time:
- 2:00 PM ET / 7:00 PM BST

Security Testing the cloud isn’t just about launching attacks—it’s about creating the right conditions to uncover what truly matters. In this session, Stephen Smiley (ScaleSec) and Jessica Stinson (Bishop Fox) break down how a well-executed architecture review can lay the foundation for more impactful red team or cloud penetration testing results.
They’ll cover how to properly configure access for a cloud penetration test and how these tests are performed, what red teamers look for during a red team engagement and how these engagements are conducted, and how to clearly distinguish between red teaming and traditional cloud pentesting.
Lastly, as GenAI models become increasingly embedded in cloud ecosystems, it’s more important than ever to understand the unique risks they introduce. The team will outline key considerations for integrating GenAI into your testing strategy to ensure complete and relevant coverage.
What You’ll Learn:
- How an upfront architecture review can elevate your test
- Key differences between cloud red teaming and cloud pen tests
- How to provision access and permissions for security testing
- How to approach security testing cloud environments that now include integrated GenAI technologies.
- How to make the most of findings and harden your environment
Speakers:
- Stephen Smiley, Consulting Director, ScaleSec
- Jessica Stinson, Senior Solutions Engineer, Bishop Fox
Who Should Watch:
This webcast is essential viewing for cloud security professionals, red teamers, penetration testers, and security architects who are responsible for securing cloud-based environments. It’s particularly valuable for those seeking to deepen their understanding of the strategic role that architecture reviews play in enabling effective cloud security assessments. Professionals involved in planning or executing red team engagements or cloud penetration tests will benefit from the detailed breakdown of methodologies, configuration best practices, and the nuances that distinguish these two approaches.