Jon Ehret of RiskRecon | Trevor Hawthorn of Stratum Security | Jared Perry of Stratum Security
About this talk
Achieving good third-party risk outcomes requires that your vendors operate secure cloud environments. Many security teams have assumed that if a third-party is using Amazon Web Services that they are operating securely, when in fact, the sheer breadth of an AWS deployment leaves plenty of room for error.
During our webinar, experts from Stratum Security and RiskRecon will take you through the expanse of a proper AWS deployment, diving into real-world examples of what can go right - and wrong - when securing AWS operations. We will discuss the core security criteria that every practitioner should be familiar with to properly assess the operations of any third-party AWS environment and will provide you will the knowledge you need to begin securing your cloud environments today.
Join this session to learn about:
- Real-world use cases where AWS environments were exploited due to missteps in configuration
- Core security criteria necessary for assessing the security of an AWS environment
- A new playbook and questionnaire that will provide you with a step-by-step guide to secure AWS operations
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa…