InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Best Practices for Securing Public Cloud Platforms with CrowdStrike & AWS [NAM]

Presented by

Merritt Baer (Principal, Office of CISO, AWS), David Puzas (Sr. Product Marketing Manager, CrowdStrike)

About this talk

Before the rise of cloud computing, enterprises could expect to be responsible for securing the systems in their data centers, their applications — everything. Because of the complexities of the threat landscape and organizational environments, security and DevSecOps teams have struggled to stay ahead. Today, more and more organizations are migrating systems in part or wholly to the cloud, and cloud service providers are ready, willing and able to ease the security burden through the shared responsibility model. We welcome you to come learn the best practices for securing your cloud in this CrowdCast with CrowdStrike and AWS. Attend this webcast to: • Understand the composition of cloud environments and the technologies that are driving adoption • Take a deep dive into the challenges of moving to the cloud and having a cloud infrastructure • Learn key best practices to secure your organization’s public cloud platforms • Find out how automation of DevSecOps processes and controls can help keep pace with the security you need
CrowdStrike

CrowdStrike

36109 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics