Hi [[ session.user.profile.firstName ]]

AWS EMEA Webinars

  • Date
  • Rating
  • Views
  • Cyber Resiliency – surviving the breach
    Cyber Resiliency – surviving the breach Misha Govshteyn, Sven Skoog Recorded: Apr 19 2017 58 mins
    In this session, you’ll learn how to setup your AWS environment to avoid a cyber security attack and how to build a cloud specific incident response plan if your organization is breached. Cyber security expert and founder of Alert Logic Misha Govshteyn will share lessons learned from organizations that have protected themselves in AWS and from those that have been breached but quickly resolved their issues and implemented strong controls as a result. Joining Misha will be Sven Skoog, Senior Manager IT Security at Monotype who will discuss the cyber security posture they implemented within the AWS cloud and how they have built a robust process to ensure ongoing protection. Session sponsored by Alert Logic.
  • AWS Security Checklist
    AWS Security Checklist Andrew Kane, Solutions Architect, AWS Recorded: Apr 19 2017 36 mins
    This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.

    Learning Objectives:

    - Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
    - Assess your existing organisational use of AWS and to ensure it meets security best practices
    - Develop AWS usage policies or validate that existing policies are being followed
  • Getting Started with AWS Security
    Getting Started with AWS Security Ian Massingham, Chief Evangelist EMEA, AWS Recorded: Apr 12 2017 32 mins
    Learn how you can help maintain control of your environment by choosing the right AWS security tools with this introductory webinar. We will show you how AWS Identity and Access Management (IAM), AWS Config Rules, and AWS Cloud Trail can help you maintain that control. You will discover how to track changes, monitor compliance, and keep an audit record of API requests.

    Learning Objectives:

    - Learn what IAM is and how to leverage it appropriately.
    - Gain familiarity with how to track changes and monitor for compliance.
    - Keep an audit record of API requests for reporting purposes.
    - Understand how these services complement each other.
  • Security Automation: Spend Less Time Securing Your Applications
    Security Automation: Spend Less Time Securing Your Applications Venkat, Nate Recorded: Apr 12 2017 55 mins
    As attackers become more sophisticated, web application developers need to constantly update their security configurations. Static firewall rules are no longer good enough. Developers need a way to deploy automated security that can learn from the application behavior and identify bad traffic patterns to detect bad bots or bad actors on the Internet. This session showcases some of the real-world customer use cases that use machine learning and AWS WAF (a web application firewall) with automated incident response and machine learning to automatically identify bad actors. We also present tutorials and code samples that show how customers can analyze traffic patterns and deploy new AWS WAF rules on the fly.
  • Architecting for End-to-End Security in the Enterprise
    Architecting for End-to-End Security in the Enterprise Hart Rossman, Bill Shinn Recorded: Apr 5 2017 47 mins
    This session tells how our most mature, security-minded Fortune 500 customers adopt AWS while improving end-to-end protection of their sensitive data. Learn about the enterprise security architecture decisions made during actual sensitive workload deployments as told by the AWS professional services and the solution architecture team members who lived them. In this very prescriptive, technical walkthrough, we share lessons learned from the development of enterprise security strategy, security use-case development, security configuration decisions, and the creation of AWS security operations playbooks to support customer architectures.
  • Hackproof Your Cloud: Responding to 2016 Threats
    Hackproof Your Cloud: Responding to 2016 Threats Aaron Newman and Aaron Klein Recorded: Mar 29 2017 51 mins
    CloudCheckr Co-Founders Aaron Newman and Aaron Klein will highlight effective strategies and tools that AWS users can employ to improve their security posture. Specific emphasis will be placed upon leveraging native AWS services and the talk will include concrete steps that users can begin employing immediately.
  • Predictive Security: Using Big Data to Fortify Your Defenses
    Predictive Security: Using Big Data to Fortify Your Defenses Michael Capicotto, Matt Nowina Recorded: Mar 22 2017 49 mins
    In a rapidly changing IT environment, detecting and responding to new threats is more important than ever. This session shows you how to build a predictive analytics stack on AWS, which harnesses the power of Amazon Machine Learning in conjunction with Amazon Elasticsearch Service, AWS CloudTrail, and VPC Flow Logs to perform tasks such as anomaly detection and log analysis. We also demonstrate how you can use AWS Lambda to act on this information in an automated fashion, such as performing updates to AWS WAF and security groups, leading to an improved security posture and alleviating operational burden on your security teams.
  • Lessons from a Chief Security Officer: Achieving Continuous Compliance
    Lessons from a Chief Security Officer: Achieving Continuous Compliance Robert Hotaling Recorded: Mar 15 2017 57 mins
    Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

    Cengage Learning’s Chief Security Officer, Robert Hotaling, shares his organization’s journey to AWS, and how they enabled continuous compliance for their dynamic environment with automation. When Cengage shifted from publishing to digital education and online learning, they needed a secure elastic infrastructure for their data intensive and cyclical business, and workload layer security tools that would help them meet compliance requirements (e.g., PCI).

    In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how Cengage used Trend Micro Deep Security to meet many compliance requirements and ensured instances were instantly protected as they came online in a hybrid cloud architecture. Session sponsored by Trend Micro, Inc.
  • Deep Dive: Running Microsoft SQL Server on AWS
    Deep Dive: Running Microsoft SQL Server on AWS Julien Lepine, Microsoft Specialist Solution Architect Recorded: Feb 9 2017 35 mins
    In our third and final Windows webinar, Amazon Web Services Microsoft Specialist SA Julien Lepine explains how SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery. The webinar will include a live Q&A, where you can get your questions answered.

    Who Should Attend:
    • IT Managers, Developers, Engineers, Solution Architects, IT Administrators, Windows Server Administrators, Database Administrators,
  • How AWS Directory Service for Microsoft AD Delivers Policy Compliance
    How AWS Directory Service for Microsoft AD Delivers Policy Compliance Julien Lepine, Microsoft Specialist Solution Architect Recorded: Feb 1 2017 47 mins
    In this Windows webinar, which is the second in the series, Amazon Web Services Microsoft Specialist SA Julien Lepine will explain the benefits of AWS Directory Service for Microsoft Active Directory (Enterprise Edition), also known as AWS Microsoft AD. This technology allows you to benefit from built-in Active Directory features such as Group Policy, trusts, and single sign-on authentication. The webinar will include a live Q&A where you can get all your AWS Microsoft AD questions answered.

    Who Should Attend:
    • IT Managers, Developers, Engineers, Solution Architects, IT Administrators, Windows Server Administrators, Systems Administrators, VP of infrastructure

Embed in website or blog