<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Offensive Engineering: Live Sessions]]></title><description><![CDATA[ Live Sessions is our weekly conversation with senior security engineers and notable leaders, published as part of each Offensive Engineering issue. Each session goes inside the technical decisions, strategic trade-offs, and real-world experiences that define security leadership today.]]></description><link>https://offensive.infosecrelations.com/s/live-sessions</link><image><url>https://substackcdn.com/image/fetch/$s_!PLlt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd8bd9b-6699-4e30-8062-980e60019033_1068x1068.png</url><title>Offensive Engineering: Live Sessions</title><link>https://offensive.infosecrelations.com/s/live-sessions</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 01:03:10 GMT</lastBuildDate><atom:link href="https://offensive.infosecrelations.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[InfoSec Relations ]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[infosecrelations@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[infosecrelations@substack.com]]></itunes:email><itunes:name><![CDATA[S Eben J]]></itunes:name></itunes:owner><itunes:author><![CDATA[S Eben J]]></itunes:author><googleplay:owner><![CDATA[infosecrelations@substack.com]]></googleplay:owner><googleplay:email><![CDATA[infosecrelations@substack.com]]></googleplay:email><googleplay:author><![CDATA[S Eben J]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Live Sessions #1 Attacking the Control Plane with Siri Verma Veggiraju]]></title><description><![CDATA[Watch now | Siri Verma Veggiraju, Tech Lead at Microsoft Azure Security, on how attackers move through cloud infrastructure, why the control plane is the ultimate prize, and what defenders consistently get wrong.]]></description><link>https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma</link><guid isPermaLink="false">https://offensive.infosecrelations.com/p/live-sessions-1-attacking-the-control-plane-siri-verma</guid><dc:creator><![CDATA[S Pattnaik]]></dc:creator><pubDate>Wed, 13 May 2026 22:57:59 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/197598020/8bfdaa96a634619db54223fa5382e421.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Cloud infrastructure has become the central battlefield for enterprise security, and the control plane is its most consequential layer. Attackers rarely go straight for it. They work through secondary accounts, leaked credentials, and overprivileged identities to reach it &#8212; and once they&#8217;re there, they can map, enumerate, and exfiltrate at scale. The rise of agentic AI and model context protocols is reshaping that attack surface in ways that most security teams have not yet fully reckoned with.</p><p>In this session of Offensive Engineering Live Sessions, <a href="https://www.linkedin.com/in/sirivarma">Siri Verma Veggiraju</a>, a tech lead at <a href="https://azure.microsoft.com/en-us/explore/security">Microsoft Azure Security</a> with hands-on experience across cloud security architecture, identity, and the control plane, walks through the mechanics of how these attacks actually unfold. He&#8217;s speaking independently, and the views he shares are his own.</p><p>The conversation covers:</p><ul><li><p>How the attack landscape against cloud infrastructure has shifted with large language models and agentic AI</p></li><li><p>Why secondary accounts are the real entry point to control plane compromise</p></li><li><p>What a realistic attack chain looked like in the early days of cloud, and why the same principles still apply</p></li><li><p>How managed identities work and where organizations consistently over-privilege them</p></li><li><p>Why API proliferation is a blind spot that most security teams underestimate</p></li><li><p>What least privilege looks like when you&#8217;re securing sub-agents in a hierarchical AI architecture</p></li><li><p>How to think about the line between a security incident and a sovereignty problem</p></li></ul><p></p>]]></content:encoded></item></channel></rss>