Achieving good third-party risk outcomes requires that your vendors operate secure cloud environments. Many security teams have assumed that if a third-party is using Amazon Web Services that they are operating securely, when in fact, the sheer breadth of an AWS deployment leaves plenty of room for error.
During our webinar, experts from Stratum Security and RiskRecon will take you through the expanse of a proper AWS deployment, diving into real-world examples of what can go right - and wrong - when securing AWS operations. We will discuss the core security criteria that every practitioner should be familiar with to properly assess the operations of any third-party AWS environment and will provide you will the knowledge you need to begin securing your cloud environments today.
Join this session to learn about:
- Real-world use cases where AWS environments were exploited due to missteps in configuration
- Core security criteria necessary for assessing the security of an AWS environment
- A new playbook and questionnaire that will provide you with a step-by-step guide to secure AWS operations