Optimizing Security for Amazon Web Services

Manage webcast
Mark Nunnikhoven/ Principal Engineer, Cloud Technology for Trend Micro
This webcast focuses on securing AWS deployments. Join Trend Micro's Mark Nunnikhoven, Principal Engineer for Cloud Technolgies, as he recaps the realities of securing today's hybrid cloud environments and approaches for securing critical applications and data.
Apr 2 2014
62 mins
Optimizing Security for Amazon Web Services
More from this community:

Cloud Computing

  • Live and recorded (4759)
  • Upcoming (96)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Automating Advanced Security in the Software Defined Data Center Jul 9 2015 4:00 pm UTC 60 mins
    Smita Deshpande, Sr. WW PLM Manager, VMware; Steve Neville, Director, Cloud and Data Center Security, Trend Micro
    Delivering security without compromising performance and efficiency.
    Business demands are constantly changing and you need to be able to respond quickly, without compromising agility, efficiency and control. Software-Defined Data Center architecture helps enterprises achieve distinct IT outcomes for greater security, availability and faster service delivery. In this webinar, you will hear how the VMware NSX network virtualization platform and Trend Micro Deep Security work together to enable scalable, high performance security and you will learn how to….

    • Simplify orchestration and automation of security controls
    • Enforce microsegmentation and unit level security
    • Manage network and system based security controls
    • Correlate system and security events through a single view
  • Accelerate Your Azure Deployment with Security Built for the Cloud Recorded: Jun 9 2015 51 mins
    Keith Vidal, Global Business Strategist, Microsoft Azure Steve Neville, Director, Cloud and Data Center Security, Trend Micro
    Discover why Trend Micro cloud security works seamlessly in the Azure compute environment so you have what it takes to speed deployments and safely maximize the benefits of the cloud. Join executives from Microsoft and Trend Micro where you’ll learn:
    •The security benefits of moving to the cloud on Azure
    •Why it’s important to understand your role in shared responsibility
    • The security you’ll need for operating system, applications, and data
    •Best practices to optimize security for agility and cost effectiveness in the cloud
  • Examining Your Security Posture in the Software Defined Data Center Recorded: May 29 2015 46 mins
    Mike Smith, Director of Data Center Security, Trend Micro
    Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:
    •Enable automated security across multiple environments
    •Correlate IT and security incidents and respond accordingly
    •Ease security deployment and management for lower cost of ownership
  • Quantifying the Value of Trend Micro Deep Security Recorded: May 28 2015 57 mins
    Jon Oltsik, Sr. Principal Analyst, ESG & Adam DeMattia, Program Manager - Economic Validation, ESG
    Cloud and data center security can be dauntingly complex, and selecting the right vendor to engage with is a critical decision for any enterprise. However, cloud and data center security can be a difficult market to navigate. Are vendors backing up their marketing claims? How do different approaches stack up next to each other? What factors need to be taken into consideration when comparing products? Trend Micro has teamed with analyst firm ESG to sort these questions out, and encourage organizations to think differently when it comes to cloud and data center security.

    ESG conducted an independent economic evaluation to investigate the differences between Trend Micro and traditional security approaches, and are conducting a live webinar to present their findings. ESG and Trend Micro will give insight into the cloud and data center security market, ESG’s Economic Value Validation methodology, and the conclusions that were reached about the value Trend Micro is providing to their customers. Join us to learn more!
  • How Willbros Builds Securely in AWS with Trend Micro Recorded: May 13 2015 47 mins
    Jason Cradit, VP of Information Services, Willbros Group
    Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share his experience on how they achieved building robust and secure pipeline management systems in the cloud.
  • Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Recorded: May 11 2015 51 mins
    Jon Oltsik, Sr. Principal Analyst, ESG Steve Neville, Director of Customer Solutions, Trend Micro
    The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:

    · Protect and secure your Windows 2003 Servers after EOS
    · Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
    · Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
  • Eliminating Security Gaps in the Modern Data Center Recorded: Apr 23 2015 29 mins
    Bruce Jamieson, Network Systems Manager, Information Systems, A&W
    Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
    • Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
    • Deliver automated security across environments
    • Ease security deployment and management for lower cost of ownership
    • Automate security deployments while increasing protection for virtual environments.
  • Optimizing Security in the Software Defined Data Center Recorded: Apr 18 2015 45 mins
    Mike Smith, Data Center Product Marketing Manager, Trend Micro; Stephen Koch, Sr. Systems Engineer at University of Pittsburg
    Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. Founded in 1787, the University of Pittsburgh is one of the oldest institutions of higher education in the US and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, University of Pittsburgh will share their story and you will learn how they:
    - Optimize data center resources with virtualization aware security
    - Deliver automated security across environments
    - Manage and deploy security efficiently
    - Achieve cost effective compliance
  • How UNB is using policy, practice, and technology to enhance cyber security Recorded: Apr 7 2015 39 mins
    David Shipley, Director, Strategic Initiatives, Information Technology Services, University of New Brunswick
    Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.

    Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.

    In less than an hour, David will tell you:
    • Why simply reinforcing perimeter defenses was not the right approach for UNB
    • How they were able to gain better security visibility and intelligence—and use it effectively
    • Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
    • And more…

    Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
  • A Clear and Present Danger: The Rise of CI Attacks in the Americas Recorded: Mar 31 2015 13 mins
    Tom Kellermann
    This webinar details the key findings for the Organization of American States collaborative survey with Trend Micro on the nature of attacks critical infrastructures in the Americas. Critical infrastructure owners and operators from 500 organizations from 22 countries participated in this in-depth survey. The webinar provides viewers with a greater understanding of the kinds of attacks experienced by critical infrastructures throughout the Americas and the best practices identified to mitigate them. You will learn which industries were most impacted, how attacks have escalated and what you should be expecting in 2015.
  • What happens when your Windows Server 2003 systems are vulnerable? Recorded: Mar 12 2015 55 mins
    Steve Neville, Solution Marketing Manager, Trend Micro & Paul Henry, Senior Instructor, SANS Institute
    In most targeted attacks, threat actors use existing vulnerabilities as point of entry to exploit vulnerable systems. Many organizations understand the importance of closing the holes by patching the system immediately, however, in reality it is an impossible task. Zero-day vulnerabilities leave the system perpetually vulnerable, leaving attackers free to zero-in to take advantage of the hole. All it takes is one vulnerability for a system to be compromised.

    This Virtual Patching webinar discusses the options organizations have to better manage vulnerabilities. It presents new methods to help organizations adapt & mitigate known & unknown vulnerabilities.
  • Executive Action Plan for Cyber Security Recorded: Mar 5 2015 34 mins
    Tom Kellermann & Bob Corson
    Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • IT Security Budgeting and Decision Making in the Wake of Targeted Attacks Recorded: Dec 11 2014 41 mins
    John Kindervag/ Vice President at Forrester Research
    It’s the golden age of cybercrime. Major data breaches are being discovered at a truly alarming pace. Executives and board members are finally taking notice—but many still haven’t evolved beyond stale thinking about the role and value of IT security. So the day-to-day work of fending off attacks remains more challenging and complex than it needs to be.

    Forrester Research VP and Principal Analyst John Kindervag will present the results of a new study commissioned by Trend Micro about IT security budgeting and decision-making priorities. He’ll share how the priorities of your peers are shifting in response to the new reality.

    At the webinar, you’ll learn:

    • How outdated perspectives on security are complicating the fight against modern cyber threats
    • How shifting the focus from return on security investment to return on risk reduction can drive more effective decision-making
    • Why security professionals must take on the role of trusted advisor within their organizations
  • BlackEnergy: The latest SCADA Threat and How To Protect Against it Recorded: Nov 25 2014 52 mins
    Kyle Wilhoit/ Senior Threat Researcher at Trend Micro and Eric Skinner/VP of Product Solutions at Trend Micro
    The Department of Homeland Security announced recently that a malware program called BlackEnergy is targeting critical infrastructure in the U.S. Industrial control systems in many key industries are at risk from threats believed to have originated with Russian government-sponsored hackers. Join Trend Micro to learn how to protect your organization from sophisticated attacks aimed specifically at your users, your supervisory control (SCADA) systems and your customers’ information. Learn now to identify risks, discover unwanted malware, and mitigate threats.
  • AWS re:Invent 2014 Roundup Recorded: Nov 20 2014 38 mins
    Mark Nunnikhoven/ Vice President of Cloud Technology at Trend Micro
    Hopefully you had a chance to attend 2014 AWS re:Invent and learn how Trend Micro offers security solutions optimized for AWS environments. We’ll discuss the recent announcements made at the show and how Trend Micro can help you meet your shared security responsibilities with comprehensive, elastic security. Build with confidence in the cloud, with Smart. Simple. Security that fits.
  • Cloud Compliance: Avoid the Critical Mistakes That Can Cost Your Job Recorded: Nov 20 2014 50 mins
    JD Sherry, VP at Trend Micro & Purnima Padmanabhan, CEO of Cavirin Systems
    When it comes to ensuring compliance and security in an elastic cloud environment, a piecemeal approach is one of the most common—but treacherous—mistakes you can make. Security and compliance depend on a holistic, strategic approach, as well as a unified team with a common agenda. Join JD Sherry, Vice President at Trend Micro, and Purnima Padmanabhan, CEO of Cavirin Systems, as they outline how to build an automated system that spans from discovery through remediation.

    You will learn how to:

    • Establish and map policies
    • Evaluate and enhance your compliance posture
    • Remediate threats in an ongoing and continuous approach
  • PoS Security Threats: Increase Compliance While Reducing Costs Recorded: Nov 13 2014 62 mins
    Rik Ferguson/ Director of Security Research at Trend Micro
    Credit card data held by the retail and hospitality industry has attracted the attention of hackers who steal and sell this data for profit. More than 65% of retail transactions are done via credit, debit or gift cards; cash transactions continue to decline worldwide. Point of Sale (PoS) devices process these transactions and send data to payment processors, so PoS devices are at the heart of these data breaches. Learn the critical 3 types of retail PoS threats, how to increase your PCI DSS 2.0 compliance, and best practices for merchants approaching the critical holiday buying and hospitality season.
    You will learn:
    • The three types of retail PoS threat categories
    • Implications for the retail and hospitality/travel & leisure industries
    • Anatomy of an PoS attack/hacker threats
    • Best practices for merchants and payment processors
    • Resources available to protect valuable data
  • Architecting Security to Address Compliance for Healthcare Providers Recorded: Nov 12 2014 56 mins
    Nadia Fahim-Koster/ Dir of IT Risk Management for Meditology Services & Tracy Harris/ Director of Healthcare Solutions
    Healthcare organizations often lack the financial and human resources required to implement comprehensive information security programs. Increasingly complex healthcare IT systems, medical devices containing software, mobile devices, patient portals, legacy systems, and aging infrastructures, all combine to make comprehensive security of the healthcare organization’s environment ever more challenging. Join Tracy Harris/ Director of Healthcare Solutions at Trend Micro and Nadia Fahim-Koster/ Director of IT Risk Management for Meditology Services as they outline why healthcare organizations are a lucrative target for attackers. The lack of a comprehensive security program often leads to data breaches. In addition, healthcare organizations must comply with increasingly complex federal and state regulatory requirements related to the privacy and security of Protected Health Information (PHI). How can a healthcare organization achieve compliance and increase security in a comprehensive and effective way?
    Join this webcast to find out:

    • How health care organizations can address risk and achieve compliance by improving security.
    • What solutions are available to create a smart protection strategy for healthcare organizations.
    • How to architect a solution that can address endpoints, the cloud, data centers, and networks so that there is protection and insight before, during or after an attack.
  • The Evolving Threat Landscape: Advanced Persistent Threats Recorded: Oct 30 2014 45 mins
    Stephen Brennan, CSC Global Technical Consulting Lead and Robert Tavares, Trend Micro VP
    No industry or organization is safe from today’s advanced persistent threats (APTs). APTs are stealthy, insidious and mutate quickly targeting high-value assets within the target organization, such as financial data, trade secrets and source codes. A 2012 Ponemon study of 56 large US organizations concluded there are 1.8 successful attacks per organization per week with a median cost of cybercrime at $8.9M. With conventional security not being able to keep up and with industry and governmental regulations changing and growing in complexity, a new approach of security is needed to quickly detect, shut down and block APTS.

    We invite you to listen to CSC’s, Global Technical Consulting Lead, Stephen Brennan and Trend Micro’s Deep Discovery experts discuss how CSC’s Advanced Threat Detection (ATD) leveraging Trend Micro’s Deep Discovery toolset helps organizations:
    • Quickly detect evolving and sophisticated “zero-day” malware and other APTs
    • Protect their most critical information assets and intellectual property from damage, data loss and downtime
    • Continuously monitor their entire network 24x7x365

    Register today for this informative event and you would win a $100 AMEX gift card by attending.
  • FBI Insights on Fighting Cybercrime – A Trend Micro Thought Leadership Event Recorded: Oct 28 2014 61 mins
    Jon Clay/ Sr. Mgr in Threat Research at Trend Micro and FBI Special Agent
    National Cyber Security Awareness Month (NCSAM) concludes with a focus on law enforcement. Join Jon Clay/Sr. Manager in Trend Micro Threat Research Communications as he moderates this LIVE session with a Special Agent who will share FBI insights on fighting cybercrime. Traditional criminals and cyber criminals are merging and the stakes have never been higher: U.S. organizations are the target of choice for intellectual property, trade secret resources and access to valuable Personally-Identifiable Information like credit cards and SSNs. Hear first-hand from the FBI Special Agent about previous complex investigations, international participation efforts and legal and investigative issues raised by computer and telecommunications technologies. Learn steps to take to detect and mitigate breaches, avoid jeopardizing digital forensics, and how to report cybercrime to the FBI or international authorities.
Data and Internet Protection
Thought leadership webinar series

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Optimizing Security for Amazon Web Services
  • Live at: Apr 2 2014 4:00 pm
  • Presented by: Mark Nunnikhoven/ Principal Engineer, Cloud Technology for Trend Micro
  • From:
Your email has been sent.
or close
You must be logged in to email this