Hi [[ session.user.profile.firstName ]]

Architecting Security into your AWS Environment

Whether you are evaluating AWS, or are already hosting your DevTest, disaster recovery or production workloads on AWS, security and compliance are high on your list of priorities.

Internet-facing web applications are often the easiest target for cyber attacks, and it is essential you have a solid security foundation to be able to continuously monitor and protect your workloads from compromise. In this webinar, learn about your responsibilities for security in your AWS environment, , the latest tricks and techniques cyber attackers are using, best practices for protecting your environment from the latest threats, and see how other customers are securing their production workloads on AWS:
• The latest cloud security threat trends
• The Shared Security Model: what security you are responsible for to protect your content, applications, systems and network v AWS
• Architecting the security on your AWS environment to take advantage of specific services such as Cloud Trail, VPC Flow Logs and Amazon S3.
• Hear how other customers are securing their production workloads on AWS

This session also includes a live Q&A, so this is a must-attend event for current or future customers of AWS. Alert Logic is an approved partner of the AWS Technology Partner Program.
Recorded Mar 2 2016 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan Holland, Director Cloud Architecture, Alert Logic
Presentation preview: Architecting Security into your AWS Environment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Quickest Way to Get Hacked in the Cloud Jun 13 2018 2:00 pm UTC 60 mins
    James Brown, Global VP of Technology Solutions, Alert Logic
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility - and it’s a big one, so how do you design a full scale?

    Public cloud providers have recently added services that root out security threats higher up the stack, but is your business prepared to systematically act on the alerts these services provide? How can you cover the full breadth of things?

    Join James Brown, Global VP of Technology Solutions, as he shares insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world.

    Highlights include:
    • How security incidents differ on hybrid networks versus public-cloud installations
    • What the top 6 web attack types are that account for 75% of verified incidents
    • Machine learning’s impact on detecting incidents and understanding attack progression
    • Important steps to preventing targeted attacks and protecting your data
    • The importance of security in light of the upcoming GDPR regulation

    This impactful webinar will help you to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security, manage risk and be compliant.
  • Is a SIEM Solution Right for Your Business? Recorded: May 22 2018 60 mins
    Guy Duchatelet, Alert Logic, Tony Bradley, Alert Logic
    SIEM solutions can be a powerful tool to help improve an organization’s security, effectively detect cyber security threats, and provide valuable insights. However, while SIEM technology is a proven, traditional approach, they are most useful for organizations with a well-staffed security team. So what about small- to mid-sized organizations? Is a SIEM solution right for you?

    Hear from Alert Logic’s threat experts on why a SIEM alone may not be the best solution for your business. In this webinar, we explore:

    • The actual costs of integrating SIEM security
    • Analytics and additional tuning required to get meaningful results from a traditional SIEM
    • Alternatives to SIEM purpose-built to deliver security results for the SMB space

    For many organizations, a Managed Detection and Response (MDR) service is a simpler, modern alternative to SIEM, delivered as a service to help organizations save time, money and frustration. Gain accurate, actionable threat insight and remediation advice, aligned with today’s threat environment, delivered predictably as a service.
  • How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic Recorded: Apr 24 2018 56 mins
    Patrick McDowell, AWS, Mike Santimaw, Rent-A-Center, Ryan Holland, Alert Logic
    Organizations looking to move their workloads to the cloud are finding that the security tools they’ve traditionally used do not place enough emphasis on protecting web applications, create performance choke points, and overburden IT staff with manual processes. Alert Logic’s security-as-a-service offerings allow you to overcome these challenges with continuous discovery, configuration assessment, managed detection and response, and vulnerability management, so you can stay secure and compliant on AWS.

    In this webinar, Alert Logic will talk about how you can protect your AWS workloads with their suite of security offerings in a matter of days instead of months, without having to hire additional staff. You’ll also learn how Rent-A-Center uses Alert Logic to comply with SOX and PCI, increase efficiency of security operations, and maintain a strong security posture on AWS.

    Watch this engaging webinar and learn:

    • What decision makers need to consider when addressing their security and compliance responsibilities on AWS
    • How security-as-a-service solutions can accelerate organizations’ migrations to AWS
    • How to address compliance mandates on AWS without compromising your security posture or budget
  • GDPR Emergency Kit: Improve Your Cybersecurity Posture Recorded: Apr 19 2018 49 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    The General Data Protection Regulation (GDPR), will come into force on 25th May 2018 and requires organisations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organisation will need to start planning now to achieve compliance and mitigate the risk of fines for failing to comply.

    Achieving and maintaining compliance with the GDPR will require detailed planning and collaboration with your employees and virtually all the businesses in your chain. It will also depend on the adoption of a pragmatic, solutions-based approach to data breach detection. Feels a bit overwhelming at this late stage, right? In this webinar we will share some proactive steps you can take to help you reduce cyber risks and stress, whilst working to address any and all gaps in your security posture.

    Join Oliver Pinson-Roxburgh, EMEA Technical Director of Sales Engineering and Solutions Architecture at Alert Logic, to hear security best practices to help reduce cyber risk, as well as to identify ways to bolster what you have done so far to address the upcoming GDPR. Highlights include:
    - GDPR and what security controls can help to reduce the risks of a data breach
    - How to assess your level of readiness and build your plan around potential concerns or gaps
    - GDPR emergency kit: Best practices for approaching cybersecurity with the view to support the GDPR

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Journey to Realisation: The Security Challenge in a Hybrid Environment Recorded: Mar 22 2018 61 mins
    Oliver Pinson-Roxburgh, EMEA Director of Sales Engineering and Solutions Architecture
    According to Forbes, hybrid cloud adoption grew 3x in the last year, increasing from 19% to 57% of organisations surveyed. This rapid growth of hybrid cloud also brings a challenge – how do you retrospectively ensure the security of on-premises infrastructure whilst focusing on cloud security? What attack intelligence do you need? Facilitated by Oliver Pinson- Roxburgh, EMEA Director of Sales Engineering and Solutions Architecture, this webinar will answer some of the practical questions companies face when exploring the next step on their journey to cloud and guide on how to optimise your security scale.

    Highlights include:
    • Today’s hybrid cloud reality
    • Understand the ever-evolving threat landscape
    • Security challenges in hybrid cloud infrastructures
    • Security by design as default

    This is part two of a three-part webinar series focused on your security journey to the cloud. Stay tuned for Part 3 coming soon.
  • Managed Threat Detection and Response for Securing AWS Applications Recorded: Mar 21 2018 45 mins
    Ryan Holland, Senior Director, Technology Services Group, Alert Logic
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic, as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security takeaways, including:

    • Guidelines to security risk modeling: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • The use of multiple data sources to attain a “defense in depth” security strategy
    • Threat detection capabilities and creating an effective incident response plan
  • Next-Generation Cloud Security for AWS Workloads Recorded: Mar 13 2018 40 mins
    Patrick McDowell, Amazon Web Services, and Ryan Holland, Alert Logic
    Knowing the where, why, and how to respond quickly to cyber threats is the foundation of protecting your AWS workloads. But due to rapid deployment and constant changes in the cloud, it’s easier said than done. Fortunately, we’re turning cloud security findings into prioritized, actionable insight.

    Join Ryan Holland, Senior Director, Technology Services Group at Alert Logic, and Patrick McDowell, Global Technical Lead, Security Partners at AWS, for an overview of two new integrated security solutions: Amazon GuardDuty™ and Alert Logic Cloud Insight™ Essentials. This live replay webcast covers:

    • Quickly attaining complete visibility of your cloud environment
    • Identifying unexpected and malicious activity through Amazon GuardDuty
    • Transforming security findings into action with Cloud Insight Essentials
    • Preventing future compromises with prioritized AWS cloud configuration best practices
  • The Ins & Outs of Your Ever-Evolving Cloud Security Strategy Recorded: Feb 27 2018 42 mins
    Dan Pitman, Senior Solution Architect, Alert Logic
    There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.

    Highlights include:

    • Understanding your cloud provider’s security model and where you need to assume security responsibility
    • Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
    • Best practice ideas for ensuring security in any cloud environment

    This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
  • The SOC Protection You Need To Defend Against Cloud Threats Recorded: Feb 21 2018 36 mins
    John Carse, VP Security Operations, Alert Logic
    It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.

    Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.

    Register now to get answers to these important questions:

    • What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
    • How does a 24x7 managed security service integrate with and enhance your security capabilities?
    • How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?
  • Get Your Cloud Security in Shape for 2018 Recorded: Jan 24 2018 51 mins
    Misha Govshteyn, Co-Founder and Senior Vice President of Products, Alert Logic
    Last year, there were several major breaches across various industries, from Equifax to Uber and everything in between. There’s no discrimination when it comes to a security breach: everyone is at risk. So how does your organization stay ahead of tomorrow’s threats in 2018? Alert Logic is here to help you find an answer!

    Join Co-Founder, Misha Govshteyn, as he presents the key learnings on last year’s top breaches along with insight to shape up your cloud security for the new year. Register now and gain the best strategies to protect your business-critical applications.

    In this engaging webinar, you’ll discover:

    • Where Are They Now: The breaches of 2017
    • Remedies to the top misconfigurations in your cloud workloads
    • The 5 security issues you’ll face in 2018
  • From Data to Action: Extending GuardDuty with Cloud Insight Recorded: Dec 12 2017 40 mins
    Patrick McDowell, Amazon Web Services, and Ryan Holland, Alert Logic
    Knowing the where, why, and how to respond quickly to cyber threats is the foundation of protecting your AWS workloads. But due to rapid deployment and constant changes in the cloud, it’s easier said than done. Fortunately, we’re turning cloud security findings into prioritized, actionable insight.

    Join Ryan Holland, Senior Director, Technology Services Group at Alert Logic, and Patrick McDowell, Global Technical Lead, Security Partners at AWS, for an overview of two new integrated security solutions: Amazon GuardDuty™ and Alert Logic Cloud Insight™ Essentials. This engaging webcast covers:

    • Quickly attaining complete visibility of your cloud environment
    • Identifying unexpected and malicious activity through Amazon GuardDuty
    • Transforming security findings into action with Cloud Insight Essentials
    • Preventing future compromises with prioritized AWS cloud configuration best practices
  • Achieving Compliance in Azure: A Panel Discussion Recorded: Nov 8 2017 55 mins
    Tom Quinn, Microsoft, Gururaj Pandurangi, Avyan Consulting, and Vince Bryant, Alert Logic
    Organizations are rapidly moving to highly scalable, multi-cloud, and hybrid environments, which adds layers of compliance complexity and blurs the lines of responsibility. How do you achieve and maintain compliance in such a dynamic environment?

    Join us for an informative round table discussion with experts from Microsoft, Avyan Consulting, and Alert Logic, as they discuss key considerations for staying compliant and secure in Azure Cloud and hybrid environments. Learn how you can capture the benefits of using cloud for your regulated workloads:

    • Best practices for running workloads in Azure and hybrid environments
    • Business benefits of leveraging the Azure partner ecosystem
    • How addressing compliance can help improve your overall security posture

    Register for Achieving Compliance in Azure today!
  • Overcoming PCI DSS Challenges While Driving Innovation Recorded: Oct 25 2017 41 mins
    Cindy Stanton, VP of Commercial Product Management, Alert Logic, and Mike Santimaw, VP of Information Security, Rent-A-Center
    Out of nearly 300 payment card data breaches investigated by Verizon between 2010 and 2016, not one of the organizations was fully PCI DSS compliant at the time of their breach. When organizations start with a robust security program, the PCI DSS compliance they achieve is supported by a program that allows them to maintain that compliance and be in the best position to secure their customers’ information. Without the proper security tools and expertise in place, businesses expose themselves to the risks of damage to their reputation, brand, and financial health. So how do you stay on top of PCI compliance?

    We sit down with Mike Santimaw, Vice President of Information Security, Innovation Labs & Corporate Solutions at Rent-A-Center, as he discusses the PCI challenges faced when making the business transition to a cloud-first approach. You’ll gain first-hand experience on the steps taken to maintain compliance for their digital presence and in over 3,000 stores across North America, while enabling customer experience innovation.

    Claim your spot and learn about:
    • The business consequences and impact when not PCI DSS compliant
    • The key steps for maintaining an effective security program and PCI compliance in a hybrid environment
    • The benefits to leveraging managed security for compliance mandates
  • Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks Recorded: Oct 11 2017 61 mins
    Misha Govshteyn, Co-Founder and SVP Products at Alert Logic
    Is your organization better protected than Equifax or Yahoo, as both were compromised using common web application attack vectors? Web application attacks are by far the largest source of breaches. And with historically low spending on web application security, more breaches are expected to come. Now is the time to push for change – and budget -because everyone is paying attention to cyber security again.

    Join Misha Govshteyn, co-founder of Alert Logic, as he presents, “Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks”.” Learn how companies of all sizes and industries are preventing exploits and containing web attacks that can’t be stopped at the perimeter. Gain a better understanding of what your organization needs for your next layer of defense.

    In this webinar, you will get insight on:

    • How Alert Logic solutions prevent and contain the damage from multi-stage attacks
    • How advanced analytics like machine learning, is put to work for you
    • Key buying criteria for web app and cloud workload security solutions
  • Understanding Your Cloud Attack Surface Recorded: Sep 27 2017 60 mins
    Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing
    As organizations continue to shift to cloud computing, new research reveals a significant consolidation of threats in specific layers of the computing model. Effective attackers, always seeking the weakest spots in network defenses, understand the changing attack landscape, have adapted their attack methods to this new paradigm. How do we evolve our security strategies to meet this challenge?

    Join Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing, as they share impactful insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world. They will discuss:

    • How security incidents differ on hybrid networks versus public-cloud installations
    • What the top 6 web attack types are that account for 75% of verified incidents
    • Machine learning’s impact on detecting incidents and understanding attack progression
    • Important steps to preventing targeted attacks and protecting your data

    Watch ‘Understanding Your Cloud Attack Surface’ to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security and manage risk.
  • Assess Your GDPR Cloud Security Readiness Recorded: Sep 19 2017 60 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Are your cloud applications GDPR ready?

    Gartner predicts that, “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”*

    In less than a year, the EU General Data Protection Regulation (GDPR) will require global organisations to control, process and protect the personal data of EU citizens at a much higher level than they do now. It’s arguably the most important regulation in a generation, but it is time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you are going to address it especially with your cloud-based applications.

    The first step for any organisation to operate within the boundaries of GDPR, is to understand how important your data is and the risk of it being compromised. To protect from hackers, you need to think like one. How are you assessing vulnerabilities and configuration flaws that might leave your data comprised? Breaches are often not discovered until weeks or months later, how are you detecting and assessing indicators of compromise so that you can know you have been breached and respond within the 72-hour deadline?

    Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:
    • Cutting through the ambiguity and focusing on the key cloud security considerations
    • Important steps to preventing targeted attacks and protecting your data
    • How to develop GDPR and Cloud enabled security blueprints
    • Best practices to getting on the road to GDPR-ready in the next 30 days

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.

    *Gartner, Focus on Five High-Priority Changes to Tackle the EU GDPR, Bart Willemsen, 30 Sept 16
  • Preparing for Cyber Attacks… Expect the Unexpected Recorded: Sep 12 2017 60 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud
    Your company is constantly under the threat of a potential cyber attack that can wreak havoc and impact your business. Cyber criminals are finding new ways to compromise systems and the hacking community continues to fine-tune their methods of attack. The maturation of hacking groups around the globe poses a cyber security threat that never stops.

    Join Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud, as they present, “Preparing for Cyber Attacks… Expect the Unexpected.” Hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.


    In this webinar, these experts will reveal:

    • The true impact of a cyber attack on a company from the bottom line to the board room
    • The importance of having a business continuity/disaster recovery plan in place
    • How business continuity planning tools and security software go hand in hand
    • The significance of exercising and testing a plan prior to an attack
  • Web App Attacks: Hacker Methodologies and Remediation Strategies Recorded: Aug 23 2017 53 mins
    Stephen Coty, Chief Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?

    Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:

    • The global perspective of the current state of web application vulnerabilities
    • Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • Remediation strategies to help defend against web apps attacks
  • Why the Web Apps You're Worried About Least Could Be Your Most Critical Exposure Recorded: Aug 2 2017 64 mins
    Misha Govshteyn, Founder and SVP Products at Alert Logic; Allison Armstrong, VP Product Marketing at Alert Logic
    What’s the best way to breach your most critical cloud workloads? Compromise your least critical web applications while no one is watching.

    Join Alert Logic’s Founder and SVP of Products, Misha Govshteyn, as he shares what’s behind the rise in web app driven breaches and how Alert Logic’s managed security solutions help organizations focus on reducing their ever-changing attack surface.

    Hold your spot for this webinar and learn about:
    • Why bad actors are using your web apps for malicious gains
    • Better assessing your cloud attack surface and where to focus when developing and deploying web apps in the cloud
    • Using supervised machine learning to detect the most prolific and damaging attacks
    • Why full-stack security is critical to your cloud security strategy

    Register now to learn more.
  • Web App Attacks: Stories from the SOC Recorded: Aug 1 2017 58 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
Security. Compliance. Cloud.
Alert Logic's channel is aimed at empowering IT Managers, CIOs, security analysts and business owners with the knowledge to make the right investment in IT security. Our channel will feature webcasts on compliance, cloud security and security-as-a-service.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Architecting Security into your AWS Environment
  • Live at: Mar 2 2016 3:00 pm
  • Presented by: Ryan Holland, Director Cloud Architecture, Alert Logic
  • From:
Your email has been sent.
or close