Get The Flock Out of My Cloud: Using DuckDB to Detect Spousal Sabotage

What happens when the insider threat shares your Wi-Fi password? In this entertaining yet educational talk, Jared and Liz Gore demonstrate how to use DuckDB to detect sophisticated cloud security threats across AWS, Azure, and GCP through a playful CTF-style demonstration.

Preview of Get The Flock Out of My Cloud: Using DuckDB to Detect Spousal Sabotage

Talk Overview

What happens when the insider threat shares your Wi-Fi password? In this unique and entertaining presentation, Jared and Liz Gore turn cloud security education into a playful CTF-style demonstration. Through the lens of “spousal sabotage,” they reveal how sophisticated attackers—from North Korean IT workers to malicious insiders—compromise cloud infrastructure, and more importantly, how to catch them using open-source tools.

The Scenario

Liz, a GCIH-certified security professional, plays the role of a sophisticated insider threat using the same tactics employed by real-world attackers. The demonstration walks through realistic attack scenarios including:

  • Backdoor Credential Creation: Establishing persistent access through IAM users and roles
  • Resource Access Manipulation: Modifying permissions to access sensitive data
  • Logging Manipulation: Attempting to cover tracks by disabling or tampering with audit logs
  • Lateral Movement: Moving across cloud accounts and services to expand access

Detection with DuckDB

The defensive side of the presentation showcases how to use DuckDB’s powerful analytical capabilities to detect these sophisticated attacks through expressive SQL queries against cloud logs and configurations. Attendees learn practical techniques for:

  • Analyzing CloudTrail logs to identify suspicious API calls
  • Querying IAM configurations to detect backdoor credentials
  • Correlating activity patterns across multiple cloud services
  • Building automated detection queries that run locally without expensive SIEM platforms

Key Takeaways

This talk demonstrates that effective security isn’t about unlimited budgets or enterprise-grade tools—it’s about understanding attacker techniques and having the right analytical approach. Security professionals learn:

  • Budget-friendly techniques for insider threat detection
  • How to think like an attacker to build better defenses
  • Practical SQL queries for cloud security monitoring
  • The importance of balancing trust with proper security boundaries

Why This Matters

Insider threats are among the most difficult security challenges to detect, whether they come from malicious employees, compromised contractors, or—as humorously demonstrated—overly curious spouses. By showing real attack techniques alongside practical detection methods, this talk provides security teams with actionable skills they can implement immediately, regardless of their tool budget.

The presentation style makes complex security concepts accessible and memorable while delivering serious value for cloud security practitioners at any experience level.

View Presentation

Access the full slide deck in your preferred format