Cloud Security Strategies: Explore the...
Organisations can be compromised and experience data breaches due to an ineffective cybersecurity strategy. In this session, Tim Rains, Amazon Web Services (AWS) EMEA Regional Leader for Security & Compliance, will inspect popular enterprise cybersecurity strategies and explain why sometimes they fail to protect. Learn how to measure the effectiveness of any cybersecurity strategy, how this should influence your IT roadmap, and how the clo...
Cloud Security Webinar: Myths and Oppor...
More and more, security is cited as a primary reason organisations around the world are embracing the cloud. Organisations that have moved to the cloud typically claim visibility and control over their data increases, versus what they had on-premises. But others continue to resist moving to the cloud arguing that it’s a security issue. How real are these threats and concerns, and where is the line between fact and myth? Join Tim Rains, t...
Security & Compliance Basics: Learn the...
Think differently about data security in the cloud – it’s not the same as you’ll find on-premises. This session will walk you through the building blocks of a cloud security model and explain the key security features of Amazon Web Services (AWS). Data protection is the highest priority for any organisation, so we’ll be answering common questions about GDPR, data residency, freedom of information, and privacy. We...
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Working with Open Data on AWS
Come learn how governments, research institutions, and private companies are using AWS to share massive amounts of data publicly. Join this webinar to discover best practices for sharing data in the cloud, how to find publicly available datasets through the Registry of Open Data on AWS, and how you can share your own data through AWS
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.