Hi [[ session.user.profile.firstName ]]

How to Architect your Cloud Apps for Peak Business Performance

In this new webinar, Amazon Web Services (AWS) and global cloud training experts, A Cloud Guru, have collaborated to help you identify and tackle the important challenges IT practitioners face when migrating business apps to the cloud. This training-based session will show you how to benchmark your performance, identify challenging areas, prioritize use cases, and pair them with relevant AWS native services and software seller solutions in AWS Marketplace.

Attendees will receive:
- Expert guidance and training on principles for designing a high-performance cloud infrastructure
- A guide to AWS Well Architected Framework (WAF), and how it's helping IT professionals understand how to build secure, agile, high-performing cloud infrastructures

- How AWS Marketplace software seller solutions are helping customers today overcome challenges related to improving their IT operations in the cloud

About the Speakers:
Robin Norwood is the creator of A Cloud Guru’s Coding for the Cloud series: a hands-on web series dedicated to building software in a modern day, serverless world. He creates engaging, accessible, and highly technical content for technology professionals at the cutting edge of cloud computing. Robin is an AWS Certified Solutions Architect, AWS Certified SysOps Administrator, and AWS Certified Developer.

Chris Chapman is a Partner Solutions Architect at AWS, covering AWS Marketplace, Service Catalog, and Control Tower. His core mission is helping customers and partners automate AWS infrastructure deployment and provisioning. He is an AWS Certified Solutions Architect, and his skills include cloud computing, data integration and architecture, SaaS computing, and design and software development. Chris has previous experience as a developer, system architect, and big data architect.
Recorded Jul 9 2019 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robin Norwood, Cloud Coding Instructor and Chris Chapman, Solutions Architect, AWS Marketplace
Presentation preview: How to Architect your Cloud Apps for Peak Business Performance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to scale Kubernetes in AWS Jun 25 2020 1:00 pm UTC 59 mins
    Tracy Ragan, Ambassador, DevOps Institute | Chris Chapman, Partner Solutions Architect, AWS | Stijn Polfliet, New Relic
    Kubernetes allows development teams to move their application workloads without having to redesign their applications or completely rethink their infrastructure thus providing flexibility and the ability to standardize on a platform. However, as you start to operate your Kubernetes environments at scale, it becomes more complex and requires special focus on monitoring for performance and health.

    Join this webinar to discover how to proactively approach the health and performance monitoring of your Kubernetes environments—at any scale and at any level of complexity. You will also discover tools you can use to get useful answers to fundamental questions, such as “What is the health of my cluster?” and “What is the hierarchy of the elements within my cluster?”

    Attendees will learn how to:

    - Obtain infrastructure and application-centric views into your clusters to understand overall K8 health and capacity
    - Improve troubleshooting and issue resolution by monitoring dynamic behavior in your clusters (i.e. new deployments, autoscaling, health checks)
    - Create an Amazon EKS Cluster and Nodes with Kubernetes integration
    - Perform end-to-end distributed tracing of running microservices

    Who Should Attend?

    IT Operations leaders and professionals, DevOps, cloud developers, cloud architects, site reliability engineers
  • How to design a least privilege architecture in AWS Jun 23 2020 1:00 pm UTC 61 mins
    Dave Shackleford , SANS analyst | Sagar Khasnis, Partner Solutions Architect at AWS
    Implementing a least privilege architecture can reduce risk and minimize disruptions by allowing only the minimum required authority to perform a duty or task. Adding network micro-segmentation also restricts east-west movement to reduce the number of vulnerable pathways to applications. When combined, these methods create a granular security environment that provides strong attack resistance.

    In this webinar, SANS and AWS Marketplace will present examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. Additionally, they will present real-world use cases of least privilege stacks and effective micro-segmentation methods that have been deployed in Amazon Web Services (AWS).

    Join this webinar to learn how to:

    - Leverage the three pillars of least privilege as a control stack to ensure security in their AWS environment
    - Map user and service relationships to use identity and access management (IAM) as an isolation and segmentation technique
    - Apply micro-segmentation to set up multiple security zones and implement robust security controls
    - Enhance security posture by locking down the control plane, delivering continuous monitoring, and ensuring platform as a service (PaaS) and container workload protection and monitoring

    Who Should Attend?

    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • How to Build a Threat Hunting Capability in AWS Jun 15 2020 1:00 pm UTC 53 mins
    Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace
    Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from alerts and SOC monitoring, and what threats to look for. You will also discover real-life examples that demonstrate how threat hunters can apply cloud infrastructure best practices to reduce the noise in often chaotic environments, making it easier to detect potential events. Leveraging detailed use cases, this webinar can help you develop an effective threat hunting program.

    Attendees will learn to:

    - Use the threat hunting loop to identify what to look for, which tools you need to analyze available data, and ways to tease out patterns that indicate potential events
    - Strike the right balance of how much data to capture, identify gaps in information, and determine how best to collect that information
    - Analyze logs efficiently and effectively using Amazon CloudWatch, AWS CloudTrail, and Amazon GuardDuty
    - Automate the process of evaluating and enriching complex data sets by utilizing SIEM and SOAR solutions to detect possible threats

    Speaker Bios

    Shaun McCullough is a community instructor for the SEC545 Cloud Security Architecture and Operations class and gives back to his profession by mentoring and supporting the next generation of cyber professionals. With 25 years of experience as a software engineer, he has been focusing on information security for the past 15 years. Shaun is a consultant with H&A Security Solutions, focusing on secure cloud operations, building DevSecOps pipelines and automating security controls in the cloud.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to Implement a Software-Defined Network Security Fabric in AWS Jun 4 2020 1:00 pm UTC 60 mins
    Dave Shakleford, SANS Analyst | Saga Khasnis, Partner Solutions Architect, AWS
    Organizations are rapidly adopting and embracing the concept of the software-defined data center (SDDC). The rapidly maturing public cloud provides a wide assortment of innovative and robust network controls, tools and services that can be readily enabled.

    Watch the webinar to learn more about:
    - Breakding down Software-Defined Network Security
    - Cloud-Native Network and Network Security Controls
    - Cloud Fabric Controls for Network Security Monitoring
    - The Emergence of SASE
    - Leveraging Infrastructure-as-Code for Automation
  • AWS, Softcat and Crowdstrike: Is your Cloud Security Enough? Recorded: May 28 2020 60 mins
    AWS Marketplace - Darren Sharpe, Channel Business | Softcat – Ant Hayes | Crowdstrike - Zeki Turedi
    In turn the requirements for protecting virtual machines (VM), container and serverless workloads in public and private clouds are evolving rapidly, and new approaches are needed to protect these hybrid environments.

    As more enterprises adopt containers and public cloud IaaS, the need to comprehensively secure cloud workloads increase exponentially.

    We’ll share what we’ve learned about securing and scaling a cloud infrastructure that is processing trillions of events per week on AWS and together with Softcat we can help you to understand the risks associated to your organisation and put the neccesary measures in place protect against attacks or breaches.

    Join this webinar to learn:
    - How best to address challenges including security and visibility related to hyper-dynamic cloud environments
    - Gain an understanding of the best practices and key elements of CrowdStrike’s approach to securing our own cloud infrastructure
    - Learn about the new capabilities being added to the Falcon platform to protect containers on AWS and how Falcon for AWS brings unrivalled breach protection for AWS workloads
    - Discuss how easy it is to procure Crowdstrike Falcon via AWS Marketplace with Softcat private offers, providing unrivalled agility and speed to market
    - Learn how Softcat’s AWS Architect teams can support customers with building and scaling workloads in AWS
    - Understand how the Softcat Security services portfolio compliments Crowdstrike Falcon protection of AWS workloads

    This webinar is suitable for:
    - CIO, CISO/CSO
    - Head of Cybersecurity and Information Security
    - IT Technical Managers
    - Security Architect

    Speakers:
    AWS Marketplace - Darren Sharpe – Senior Channel business manager
    Softcat – Ant Hayes – AWS Solutions Architect
    Crowdstrike - Zeki Turedi – Technology Strategist, EMEA
  • How to design a least privilege architecture in AWS Recorded: Apr 30 2020 61 mins
    Dave Shackleford , SANS analyst | Sagar Khasnis, Partner Solutions Architect at AWS
    Implementing a least privilege architecture can reduce risk and minimize disruptions by allowing only the minimum required authority to perform a duty or task. Adding network micro-segmentation also restricts east-west movement to reduce the number of vulnerable pathways to applications. When combined, these methods create a granular security environment that provides strong attack resistance.

    In this webinar, SANS and AWS Marketplace will present examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. Additionally, they will present real-world use cases of least privilege stacks and effective micro-segmentation methods that have been deployed in Amazon Web Services (AWS).

    Join this webinar to learn how to:

    - Leverage the three pillars of least privilege as a control stack to ensure security in their AWS environment
    - Map user and service relationships to use identity and access management (IAM) as an isolation and segmentation technique
    - Apply micro-segmentation to set up multiple security zones and implement robust security controls
    - Enhance security posture by locking down the control plane, delivering continuous monitoring, and ensuring platform as a service (PaaS) and container workload protection and monitoring

    Who Should Attend?

    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • How to prioritize security controls for situational awareness in AWS Recorded: Apr 23 2020 55 mins
    Sounil Yu, Creator of the Cyber Defense Matrix | Josh Thurston, Sr. Category Lead, Security at AWS
    Defenders need meaningful situational awareness to safeguard their sensitive data and sustain key operations. By establishing visibility and accountability in Amazon Web Services (AWS), organizations gain situational awareness to detect and discern unusual events in their environment. These insights gains help security operations and defenders make informed decisions on how to respond to and recover from security events.

    Attend this webinar to learn how you can systematically and methodically improve your situational awareness. Discover ways to then act upon those insights by leveraging technologies to support threat intelligence, log collection and analysis, incident response, and security orchestration.

    Join this webinar to learn how to:

    - Uncover opportunities to increase visibility into your AWS environment and the strength of your foundational controls
    - Leverage AWS Marketplace technologies and native AWS capabilities to detect, respond, and recover from unexpected events
    - Discover other layered controls to further enhance your situational awareness and security posture in AWS

    Who Should Attend?

    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.

    Speakers

    - Sounil Yu, Creator of the Cyber Defense Matrix
    - Josh Thurston, Sr. Category Lead, Security at AWS
    - Sagar Khasnis, Partner Solutions Architect at AWS
  • How to scale Kubernetes in AWS Recorded: Apr 2 2020 59 mins
    Tracy Ragan, Ambassador, DevOps Institute | Chris Chapman, Partner Solutions Architect, AWS | Stijn Polfliet, New Relic
    Kubernetes allows development teams to move their application workloads without having to redesign their applications or completely rethink their infrastructure thus providing flexibility and the ability to standardize on a platform. However, as you start to operate your Kubernetes environments at scale, it becomes more complex and requires special focus on monitoring for performance and health.

    Join this webinar to discover how to proactively approach the health and performance monitoring of your Kubernetes environments—at any scale and at any level of complexity. You will also discover tools you can use to get useful answers to fundamental questions, such as “What is the health of my cluster?” and “What is the hierarchy of the elements within my cluster?”

    Attendees will learn how to:

    - Obtain infrastructure and application-centric views into your clusters to understand overall K8 health and capacity
    - Improve troubleshooting and issue resolution by monitoring dynamic behavior in your clusters (i.e. new deployments, autoscaling, health checks)
    - Create an Amazon EKS Cluster and Nodes with Kubernetes integration
    - Perform end-to-end distributed tracing of running microservices

    Who Should Attend?

    IT Operations leaders and professionals, DevOps, cloud developers, cloud architects, site reliability engineers
  • How to Build a Threat Hunting Capability in AWS Recorded: Mar 12 2020 53 mins
    Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace
    Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from alerts and SOC monitoring, and what threats to look for. You will also discover real-life examples that demonstrate how threat hunters can apply cloud infrastructure best practices to reduce the noise in often chaotic environments, making it easier to detect potential events. Leveraging detailed use cases, this webinar can help you develop an effective threat hunting program.

    Attendees will learn to:

    - Use the threat hunting loop to identify what to look for, which tools you need to analyze available data, and ways to tease out patterns that indicate potential events
    - Strike the right balance of how much data to capture, identify gaps in information, and determine how best to collect that information
    - Analyze logs efficiently and effectively using Amazon CloudWatch, AWS CloudTrail, and Amazon GuardDuty
    - Automate the process of evaluating and enriching complex data sets by utilizing SIEM and SOAR solutions to detect possible threats

    Speaker Bios

    Shaun McCullough is a community instructor for the SEC545 Cloud Security Architecture and Operations class and gives back to his profession by mentoring and supporting the next generation of cyber professionals. With 25 years of experience as a software engineer, he has been focusing on information security for the past 15 years. Shaun is a consultant with H&A Security Solutions, focusing on secure cloud operations, building DevSecOps pipelines and automating security controls in the cloud.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to leverage endpoint detection and response (EDR) in AWS investigations Recorded: Mar 10 2020 61 mins
    Justin Henderson, SANS Analyst | Saager Khasnis, Partner Solutions Architect at AWS
    Adding EDR capabilities into your AWS (Amazon Web Services) environment can inform investigations and provide actionable details for remediation. Attend this webinar to discover how to unpack and leverage the telemetry provided by endpoint security solutions using MITRE Cloud examples, such as Exploit Public-Facing Application (T1190) and Data Transfer to Cloud Account (T1537) by examining process trees. You will also find out how these solutions can help identify who has vulnerable software or configurations on their systems by leveraging indicators of compromise (IOC) to pinpoint the depth and breadth of malware (MD5).

    View this on-demand webinar to learn how to:

    - Utilize endpoint security visibility to enrich your investigations in AWS
    - Use EDR to add thousands of host-based observables for threat hunting
    - Auto-scale threat detection across all your cloud endpoints
    - Integrate a cloud access security broker (CASB) to extend protection to cloud apps


    Who Should Attend?

    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • JumpStart Guide for Endpoint Security in AWS Recorded: Mar 3 2020 56 mins
    David Hazar SANS analyst, SANS Institute | David Aiken, Solutions Architect Manager AWS Marketplace
    When migrating endpoint security controls to protect their cloud workloads, organizations must first consider their own security, operational and business needs. Next, they should assess their requirements against the solutions already in use in-house against the in-cloud security solutions they’re considering. Ultimately, these requirements should help organizations come to a decision on whether to migrate their existing security to the cloud, or use cloud-provided tools to protect their cloud endpoints.

    SANS instructor David Hazar, AWS Solutions Architect Manager David Aiken, and Optiv Cloud Security Practice Leader Joe Vadakkan will release guidelines for determining your cloud endpoint security controls and selecting solutions through the AWS Marketplace.

    Attendees will learn:

    - How cloud design affects endpoint security
    - Needs and capabilities associated with endpoint security platforms in the cloud (such as automation, behavioral detection and blocking, and threat hunting capabilities)
    - Specific focus on cloud-based endpoint detection and response (EDR)
    - Solution guidance and evaluation considerations for endpoint security platforms, including real-world success observations
    - Key questions for potential vendors to determine which endpoint security platform(s) are best-suited for integration and implementation in your AWS environment

    Join this webinar and gain practical knowledge on how to evaluate and select an effective endpoint security platform for the cloud. Don’t miss this opportunity to improve your endpoint security strategy with industry-leading guidance from SANS, Optiv and AWS Marketplace.
  • How to Perform a Security Investigation in AWS Recorded: Feb 27 2020 53 mins
    Kyle Dickinson, SANS Institue | David Aiken, AWS Marketplace Solutions Architect
    Do you have a plan in place describing how to conduct an effective investigation in AWS? What security controls, techniques, and data sources can you leverage when investigating and containing an incident in the cloud? Learn how to leverage different technologies to determine the source and timeline of the event, and the systems targeted to define a reliable starting point from which to begin your investigations.

    In this recorded webcast, SANS instructor and cloud security expert Kyle Dickinson explains how to conduct an investigation in AWS from preparation through completion.

    Attendees at this webcast will learn about:
    - Prerequisites for performing an effective investigation
    - Services that enable an investigation
    - How to plan an investigation
    - Steps to completing an investigation in AWS

    Register for this webcast to be among the first to receive the associated whitepaper written by incident response and forensics expert Kyle Dickinson.

    Speaker Bios

    Kyle Dickinson teaches SANS SEC545: Cloud Security Architecture and Operations and has contributed to the creation of other SANS courses. He is a cloud security architect for one of the largest privately held companies in the United States. As a strategic consultant in his organization, Kyle partners with businesses in various industries to better understand security and risks associated with cloud services. He has held many roles in IT, ranging from systems administration to network engineering and from endpoint architecture to incident response and forensic analysis.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to improve security visibility and detection-response operations in AWS Recorded: Feb 20 2020 54 mins
    Dave Shackleford, SANS Analyst | Vinay Sukumar, Principal Category Leader (Security Intelligence) at AWS
    Security teams often handle a large stream of alerts, creating noise and impairing their ability to determine which incidents to prioritize. By aggregating security information from various sources and automating incident response, organizations can increase visibility into their environment and focus on the most important potential threats. In this webinar, SANS and AWS Marketplace explore how organizations can leverage solutions to create more signal and less noise for actionable responses, enhancing and accelerating security operations.

    Attendees will learn to:

    - Use continuous monitoring to gain insight into events and behaviors that move into and through your cloud environment
    - Integrate security incident and event management (SIEM) solutions to enhance detection and investigation of potential threats
    - Leverage security orchestration automation and response (SOAR) technologies to auto-remediate events and reduce noise in your environment

    Who should attend:
    Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
  • How to prepare your data pipeline for machine learning and AI Recorded: Feb 18 2020 50 mins
    Stewart Bond, Research Director, Data Integration and Integrity Software at IDC | Chris Chapman, Partner Solutions Architect
    Frequently, the hardest part of any machine learning (ML)/AI project is getting your data into the right format and the right place because your processes were designed around traditional application development. In this training-based webinar, Amazon Web Services (AWS) and global market intelligence provider, IDC, will deliver practical guidance to help you prepare a data pipeline that can automate machine learning workflows.

    Attendees will learn how to:

    - Manage your data pipeline, providing your organization access to reliable and well-structured datasets for analytics
    - Make meaningful decisions, faster, with improved data flows
    - Incorporate best practices for building dashboards to query specific data and identify trends when using connected AWS services
    - Leverage partner solutions such as Matillion ETL for Amazon Redshift for loading and transforming your data

    Who should attend?
    IT Operations Professionals in roles overseeing data science and architecture, BI and analytics and data preparation for machine learning
  • How to Build a Threat Hunting Capability in AWS Recorded: Jan 3 2020 53 mins
    Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace
    Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from alerts and SOC monitoring, and what threats to look for. You will also discover real-life examples that demonstrate how threat hunters can apply cloud infrastructure best practices to reduce the noise in often chaotic environments, making it easier to detect potential events. Leveraging detailed use cases, this webinar can help you develop an effective threat hunting program.

    Attendees will learn to:

    - Use the threat hunting loop to identify what to look for, which tools you need to analyze available data, and ways to tease out patterns that indicate potential events
    - Strike the right balance of how much data to capture, identify gaps in information, and determine how best to collect that information
    - Analyze logs efficiently and effectively using Amazon CloudWatch, AWS CloudTrail, and Amazon GuardDuty
    - Automate the process of evaluating and enriching complex data sets by utilizing SIEM and SOAR solutions to detect possible threats

    Speaker Bios

    Shaun McCullough is a community instructor for the SEC545 Cloud Security Architecture and Operations class and gives back to his profession by mentoring and supporting the next generation of cyber professionals. With 25 years of experience as a software engineer, he has been focusing on information security for the past 15 years. Shaun is a consultant with H&A Security Solutions, focusing on secure cloud operations, building DevSecOps pipelines and automating security controls in the cloud.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to Perform a Security Investigation in AWS Recorded: Dec 30 2019 53 mins
    Kyle Dickinson, SANS Institue | David Aiken, AWS Marketplace Solutions Architect
    Do you have a plan in place describing how to conduct an effective investigation in AWS? What security controls, techniques, and data sources can you leverage when investigating and containing an incident in the cloud? Learn how to leverage different technologies to determine the source and timeline of the event, and the systems targeted to define a reliable starting point from which to begin your investigations.

    In this recorded webcast, SANS instructor and cloud security expert Kyle Dickinson explains how to conduct an investigation in AWS from preparation through completion.

    Attendees at this webcast will learn about:
    - Prerequisites for performing an effective investigation
    - Services that enable an investigation
    - How to plan an investigation
    - Steps to completing an investigation in AWS

    Register for this webcast to be among the first to receive the associated whitepaper written by incident response and forensics expert Kyle Dickinson.

    Speaker Bios

    Kyle Dickinson teaches SANS SEC545: Cloud Security Architecture and Operations and has contributed to the creation of other SANS courses. He is a cloud security architect for one of the largest privately held companies in the United States. As a strategic consultant in his organization, Kyle partners with businesses in various industries to better understand security and risks associated with cloud services. He has held many roles in IT, ranging from systems administration to network engineering and from endpoint architecture to incident response and forensic analysis.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • How to Secure App Pipelines in AWS Recorded: Dec 18 2019 56 mins
    Dave Shackleford | SANS analyst, SANS institute; David Aiken | Solutions Architect, AWS Marketplace
    Applications have evolved into containers and microservices deployed in fully automated and distributed environments across data centers and in AWS. This webinar focuses on the security of the continuous integration and continuous deployment (CI/CD) pipeline and security automation. In this prerecorded webcast, SANS senior instructor Dave Shackleford and AWS Solutions Architect David Aiken discuss how to improve and automate security across the entire CI/CD pipeline and runtime environment.

    Specifically, attendees will learn:
    - App security concepts specific to cloud environments, including management of secrets, security of APIs, serverless applications and security, and privilege management
    - The stages of a cloud-oriented development pipeline and how security can tie into the CI/CD pipeline
    - How to mitigate disruptions caused by perimeter-based and legacy security tools that don't fit into CI/CD practices
    - Solutions for securing your app pipeline in your AWS environment

    *********************

    Speaker Bios
    Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA’s that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Accelerate your Migration to Amazon Web Services Recorded: Oct 10 2019 29 mins
    Mor Hezi, Principal Business Development, AWS Marketplace
    Enterprises are faced with several strategy options when building their cloud migration. Building the optimal path for existing and future application needs can be challenging. AWS and AWS Marketplace provide the tools and software for pre and post-migration, sustaining business value with a cloud operating model and modernizing your infrastructure.

    Whether you are just exploring or in the midst of a cloud migration, this session can provide some tips on the correct strategy and tools.
  • Cloud Migration Strategies and Tools Recorded: Oct 10 2019 41 mins
    Alex Hilton, Cloud Industry Forum | Martin Beeby, AWS | Jim Ball, clckwrk
    As enterprises become increasingly complex, cloud migration is no longer an option but a necessity. Choosing and planning the right path for your organizations data, applications and storage can be daunting!

    Join industry experts to discuss how to succeed in accelerating your migrating to the cloud. Topics include:

    - Planning your cloud migration strategy - Tips and tricks
    - Tools and software for pre and post-migration
    - How to sustain business value with a cloud operating model
    - How to modernize your infrastructure

    Moderated by:
    Alex Hilton, CEO, Cloud Industry Forum

    Interviewees:
    Martin Beeby, Principal Technology Evangelist, AWS
    James Ball, VP Global Alliances, clckwrk
    Nick Cronin, Director, Global Stretegic Alliances, Splunk
  • Changing the way you buy and sell software with AWS Marketplace and New Relic Recorded: Oct 2 2019 64 mins
    Todd Osborne - New Relic, Patrick Ludwig - AWS Marketplace, John Jahnke - Tackle.io
    In this webinar you will learn how to leverage a digital marketplace to grow your software business and improve your customer’s experience. We will talk through the full lifecycle of AWS Marketplace and how it is changing the software experience for customers and software vendors (ISVs).

    Todd Osborne, Global VP of Alliances and Channels at New Relic, will share their experience with AWS Marketplace and how they initiated their journey. Todd will also outline how New Relic are utilizing this digital marketplace to connect with the customer buyer, decision makers and procurement to unlock budget and enable faster and larger transactions.

    John Jahnke, CEO of Tackle.io, will discuss how New Relic partnered with them to make selling on the AWS Marketplace seamless by leveraging the Tackle.io platform. John will provide insight into how to get started with AWS Marketplace technically and operationally.

    Lastly hear from AWS Marketplace on selling with AWS and how AWS Marketplace gives you access to more than 240,000 active customers. Additionally, we'll examine how AWS Marketplace and the APN Programme enables ISVs to collaborate with AWS and APN Consulting Partners to resell through AWS Marketplace.
Online Series highlighting AWS Marketplace Solutions and Categories
AWS Marketplace is an online store that helps customers discover, purchase, migrate and immediately start using the software and services they need to build products and run their businesses. English Speaking Webinars.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Architect your Cloud Apps for Peak Business Performance
  • Live at: Jul 9 2019 1:00 pm
  • Presented by: Robin Norwood, Cloud Coding Instructor and Chris Chapman, Solutions Architect, AWS Marketplace
  • From:
Your email has been sent.
or close