Hi [[ session.user.profile.firstName ]]

Using Frameworks to Find and Prevent Security Gaps in your Workloads on AWS

You configured a workload in your AWS environment, but how do you know if it’s secure? When tested, 75% of customers’ workloads on AWS failed cybersecurity configuration checks. Please join us for a discussion on using industry standard frameworks to benchmark the security of your AWS workloads.

Our featured presenters are Daniel Swart, Partner Solutions Architect, Amazon Web Services and Dan Pitman, Principal Security Architect, Alert Logic.

Learn what you’re responsible for securing under the AWS Shared Responsibility Model.

Get insight to the leading frameworks used to benchmark security in AWS including the AWS Well-Architected Review, CIS Benchmarks, and NIST.

Learn how to find security gaps and achieve compliance using these frameworks.

Discover best practices to manage cybersecurity drift driven by changing configurations and threats.
Recorded Jun 8 2021 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dan Pitman, Alert Logic and Daniel Swart, Solutions Architect, Amazon Web Services
Presentation preview: Using Frameworks to Find and Prevent Security Gaps in your Workloads on AWS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Technical Journey for Securing Your Workloads on AWS Recorded: Aug 31 2021 64 mins
    Daniel Swart, AWS; Jeremy Breland, Alert Logic; Bharath Vasudevan, Alert Logic
    Join our technical experts for a live discussion on securing your AWS workloads including serverless, containers, web application firewalls, configuration issues, managing drift, and more. Then we’ll do a deep dive into developing Response capabilities for cloud workloads – because no amount of Prevention is 100% effective and you need a Detection and Response plan. We’ll discuss how to use NIST to ensure that your response plan enables SaaS business continuity. And we’ll present a Response maturity model to help you focus on which processes should be manual, guided, or automated. Finally, we’ll save time to answer your specific questions on securing cloud workloads.
  • Achieving Compliance in AWS for SaaS Software Companies Recorded: Aug 25 2021 36 mins
    Zuri Cortez, Principal Solutions Engineer; Antonio Sanchez, Product Marketing Manager
    You just received angel-funding and must shift to hyper-growth mode. You know you need to be mindful of PCI, SOC2, and ISO mandates but don’t want security to become a choke point in your delivery cycle.

    Join us as we discuss how you can stay secure and compliant while accelerating delivery of your AWS SaaS applications.
  • Achieving Compliance in AWS for SaaS Software Companies Recorded: Aug 19 2021 36 mins
    Zuri Cortez, Principal Solutions Engineer; Antonio Sanchez, Product Marketing Manager
    You just received angel-funding and must shift to hyper-growth mode. You know you need to be mindful of PCI, SOC2, and ISO mandates but don’t want security to become a choke point in your delivery cycle.

    Join us as we discuss how you can stay secure and compliant while accelerating delivery of your AWS SaaS applications.
  • Making Sense of Your Cybersecurity Strategy for AWS Recorded: Aug 17 2021 64 mins
    Doug Cahill, ESG; Ryan Orsi, AWS; Onkar Birk, Alert Logic; Bharath Vasudevan, Alert Logic
    Join a panel of industry leaders for a live discussion that will help you understand the key trends, challenges, and solutions for securing your workloads on AWS. Get clarity on what you’re responsible for under the shared responsibility model for each stage of the cloud journey. We’ll help you make sense of EDR, XDR and MDR as well as the pros and cons of doing it yourself with tools vs managed services approaches for securing cloud workloads. And we’ll help you formulate an approach to building Response processes for cloud workloads that ensure business continuity.
  • The CISO Perspective on Cybersecurity for a Cloud-first, Fintech Business Recorded: Jul 15 2021 37 mins
    Jason Ozin, PIB Group; Bharath Vasudevan, Alert Logic
    PIB Group has grown rapidly through mergers and acquisitions – acquiring 15+ businesses across Europe since being launched in 2015. Join us for a discussion with the CISO on how they manage the cybersecurity challenges of integrating these businesses and legacy systems into their cloud-first strategy on AWS.
  • The Technical Journey for Securing Your Workloads on AWS Recorded: Jul 15 2021 64 mins
    Daniel Swart, AWS; Jeremy Breland, Alert Logic; Bharath Vasudevan, Alert Logic
    Join our technical experts for a live discussion on securing your AWS workloads including serverless, containers, web application firewalls, configuration issues, managing drift, and more. Then we’ll do a deep dive into developing Response capabilities for cloud workloads – because no amount of Prevention is 100% effective and you need a Detection and Response plan. We’ll discuss how to use NIST to ensure that your response plan enables SaaS business continuity. And we’ll present a Response maturity model to help you focus on which processes should be manual, guided, or automated. Finally, we’ll save time to answer your specific questions on securing cloud workloads.
  • Securing Complex Workloads in AWS Recorded: Jun 29 2021 37 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    Whether your migration to AWS has just begun, you’re already there, or your organization was born in the cloud, there are mission-critical factors to consider when securing your AWS-hosted workloads.

    AWS provides security services and tools to help secure your workloads and there are many external standards and guidance you can leverage, such as the CIS Benchmarks for AWS. While AWS provides security of the cloud, you are responsible for security in the cloud.

    In this webinar, we offer expert guidance for building robust and effective security into your AWS-hosted workloads — allowing you to focus on meeting the most important demands of your business.

    You will learn:

    -Best practices for securing AWS-hosted workloads (users to containers, to serverless)
    -How to leverage AWS security services (AWS Network Firewall, the AWS WAF, etc.)
    -Ways to improve your ability to meet core security and compliance requirements
    -A new understanding of shared responsibility in the cloud
  • How to Secure Containers on AWS Recorded: Jun 21 2021 59 mins
    Curtis Rissi, Senior Solutions Architect, Amazon Web Services and Dan Pitman
    Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host.

    Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include:

    Understand the impact your container hosting strategy will have on your security requirements

    Learn some critical security best practices for the different container architectural building blocks, including Amazon ECS, Amazon EKS and AWS Fargate

    Get insights into the key risks you’ll face with vital hints and tips to keep your containers secure
  • Making Sense of Your Cybersecurity Strategy for AWS Recorded: Jun 15 2021 64 mins
    Doug Cahill, ESG; Ryan Orsi, AWS; Onkar Birk, Alert Logic; Bharath Vasudevan, Alert Logic
    Join a panel of industry leaders for a live discussion that will help you understand the key trends, challenges, and solutions for securing your workloads on AWS. Get clarity on what you’re responsible for under the shared responsibility model for each stage of the cloud journey. We’ll help you make sense of EDR, XDR and MDR as well as the pros and cons of doing it yourself with tools vs managed services approaches for securing cloud workloads. And we’ll help you formulate an approach to building Response processes for cloud workloads that ensure business continuity.
  • Security Requirements for Designing SaaS Applications on AWS Recorded: Jun 15 2021 38 mins
    Dan Pitman
    Whether you are a software company or a business with revenue-driving applications, the journey to SaaS introduces a complex set of cyber security challenges.

    Through this webinar:

    Learn how to build security into SaaS application development

    Discover how your starting point impacts the security of your new delivery model

    Explore key security requirements for micro-services, containers and serverless
  • Using Frameworks to Find and Prevent Security Gaps in your Workloads on AWS Recorded: Jun 8 2021 59 mins
    Dan Pitman, Alert Logic and Daniel Swart, Solutions Architect, Amazon Web Services
    You configured a workload in your AWS environment, but how do you know if it’s secure? When tested, 75% of customers’ workloads on AWS failed cybersecurity configuration checks. Please join us for a discussion on using industry standard frameworks to benchmark the security of your AWS workloads.

    Our featured presenters are Daniel Swart, Partner Solutions Architect, Amazon Web Services and Dan Pitman, Principal Security Architect, Alert Logic.

    Learn what you’re responsible for securing under the AWS Shared Responsibility Model.

    Get insight to the leading frameworks used to benchmark security in AWS including the AWS Well-Architected Review, CIS Benchmarks, and NIST.

    Learn how to find security gaps and achieve compliance using these frameworks.

    Discover best practices to manage cybersecurity drift driven by changing configurations and threats.
  • Cloud Security: Rehosting to Refactoring Migration Strategies Recorded: Jun 4 2021 57 mins
    Edward Merrett, Security Operations Manager, McArthurGlen
    When migrating to the cloud, the complexity and intricacies of doing a safe, secure and effective migration can make your head spin. How do you know what is the right migration approach for your organization? Join us as we take you through the best practices and key considerations of selecting a cloud migration strategy.  

    This webinar will feature guest speaker Edward Merrett, Security Operations Manager of McArthurGlen. With a  passion for  cyber and best practices, Edward will share his first-hand experience with cloud migration, including lessons learned and best practices to keep you one step ahead in your migration journey.  

    In this webinar, we will: 

    Highlight security considerations with migrating to the cloud in hybrid, complex environments 

    Explore key migration strategies to consider from rehosting (“lift and shift”) to refactoring (“rearchitecting”) 

    Dive deeper into “lift and shift” approach including what to expect and what to watch out for  

    Share best practices of cloud migration you should incorporate in your strategy
  • How to Secure Containers on AWS Recorded: Jun 4 2021 59 mins
    Curtis Rissi, Senior Solutions Architect, Amazon Web Services and Dan Pitman
    Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host.

    Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include:

    Understand the impact your container hosting strategy will have on your security requirements

    Learn some critical security best practices for the different container architectural building blocks, including Amazon ECS, Amazon EKS and AWS Fargate

    Get insights into the key risks you’ll face with vital hints and tips to keep your containers secure
  • A Guide to Threat Detection and Response Recorded: Jun 4 2021 47 mins
    Dave Gruber, Senior Analyst, ESG and Jack Danahy
    Discussion on the differences between XDR, EDR, and MDR. You’ll gain an understanding of requirements to assess your business needs for threat detection and response. We have two industry experts for our presenters: Dave Gruber, Senior Analyst – ESG and Jack Danahy, Advisor – Danahy Analytics. Here’s what you’ll learn by attending the webinar:

    Learn about the differences between XDR, EDR, and MDR.

    Get a list of practical requirements to assess your needs for detection and response.

    Gain insight to the challenges of managing these platforms – making the managed vs non-managed decision.
  • Security Requirements for Designing SaaS Applications on AWS Recorded: Jun 4 2021 38 mins
    Dan Pitman
    Whether you are a software company or a business with revenue-driving applications, the journey to SaaS introduces a complex set of cyber security challenges.

    Through this webinar:

    Learn how to build security into SaaS application development

    Discover how your starting point impacts the security of your new delivery model

    Explore key security requirements for micro-services, containers and serverless
  • Practical Requirements for Responding to Cyber Threats Recorded: Jun 4 2021 59 mins
    Aaron Sherrill, Senior Research Analyst, 451 Research, Onkar Birk and Bharath Vasudevan, Alert Logic
    It’s inevitable that cyber threats will get past Preventative tools. Most companies are adopting a balanced approach to cybersecurity Prevention, Detection, and Response. After you detect and contain a threat, you need rapid and efficient Response capabilities to remediate the issues.

    Please join our panel of experts as we discuss response capabilities, industry best practices, and a phased approach to improve to your Response program.

    Learn how to define your Response strategy based on asset types, compliance requirements, risk tolerance, and more.

    Get insight to the key categories of Response capabilities and how these capabilities differ from provider to provider.

    Discover a phased approach to add scalability to your response program by implementing, human-guided and fully automated Response so your team handle more and free up time to focus on other tasks.
  • Using Frameworks to Find and Prevent Security Gaps in your Workloads on AWS Recorded: Jun 4 2021 59 mins
    Dan Pitman, Alert Logic and Daniel Swart, Solutions Architect, Amazon Web Services
    You configured a workload in your AWS environment, but how do you know if it’s secure? When tested, 75% of customers’ workloads on AWS failed cybersecurity configuration checks. Please join us for a discussion on using industry standard frameworks to benchmark the security of your AWS workloads.

    Our featured presenters are Daniel Swart, Partner Solutions Architect, Amazon Web Services and Dan Pitman, Principal Security Architect, Alert Logic.

    Learn what you’re responsible for securing under the AWS Shared Responsibility Model.

    Get insight to the leading frameworks used to benchmark security in AWS including the AWS Well-Architected Review, CIS Benchmarks, and NIST.

    Learn how to find security gaps and achieve compliance using these frameworks.

    Discover best practices to manage cybersecurity drift driven by changing configurations and threats.
  • Could an MSSP Unlock Your Full Cloud Potential? Recorded: May 11 2021 51 mins
    Dan Webb, VP of Partner Alliances, Ryan Orsi, World Wide Practice Lead, MSSP AWS
    In this webinar, Amazon Web Services (AWS) and Alert Logic discuss how managed security can enable organizations to accelerate and unlock successful business outcomes in their cloud transformation journey.

    Hear from AWS and Alert Logic to learn:
    o The importance of understanding customer responsibility capabilities in the AWS Shared Security Responsibility Model
    o Main differences between a security DIY model and an MSSP model
    o Cloud Transformation customer challenges and how 24/7 managed security providers can help overcome them
    o An example of how Alert Logic MDR security solutions enabled accelerated agility on AWS for a SaaS company so that they could focus on innovation and business value
  • Cloud Transformation to AWS: It’s a Marathon Not a Sprint [Episode 3 of 3] Recorded: May 4 2021 36 mins
    Dan Webb, VP of Partner Alliances, and Dan Pitman, Principal Security Architect
    The cloud transformation journey is an on-going one of refinement and optimization.

    Organizations with a cloud-first or cloud-mature approach will find a drive to business and operational scale brings about complexity and increasing responsibilities across hybrid, SaaS, and PaaS workloads.

    Without the proper planning and processes put into place to optimize this part of the cloud journey, this diversity of technologies and delivery models can significantly hamper efficiency and optimization gains as well as introduce security risks that can affect the bottom line.

    During this webcast we'll discuss:

    Proper preparation for the complexity of scale
    Maintaining security whilst accelerating growth
    Real-world examples of how to refine your security operations

    At the conclusion of the session, you'll walk away with understanding how maintaining security at the core of your cloud transformation will enable growth, scale and expansion of your business.
  • Cloud Transformation with AWS: Keeping up the pace [Episode 2 of 3] Recorded: Apr 27 2021 37 mins
    Dan Webb, VP of Partner Alliances, and Dan Pitman, Principal Security Architect
    The value of being in the AWS cloud in the first place is clear; cost savings and efficiencies in key areas can be achieved quickly, if done right. But that is where the race for modernization with your competitors starts.

    Digital and cloud transformation in a competitive market requires a velocity of change that inherently adds risk if the maturity of security processes and delivery is not able to match that velocity.

    During this webcast, we'll explore how your business can fully leverage the public cloud, including the AWS cloud to drive modernization of applications and business models by also modernizing your security capabilities.

    At the conclusion of the session, you'll walk away with some key steps you can take to enable modernization.
Webcasts
Alert Logic is the industry’s first SaaS-enabled managed detection and response provider, delivering unrivaled security value. Founded in 2002, we are headquartered in Houston, Texas.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using Frameworks to Find and Prevent Security Gaps in your Workloads on AWS
  • Live at: Jun 8 2021 4:00 pm
  • Presented by: Dan Pitman, Alert Logic and Daniel Swart, Solutions Architect, Amazon Web Services
  • From:
Your email has been sent.
or close