InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Deploy Automated AWS Defenses for Threat Prevention

Presented by

Ernesto Marquez, Project Director | Concurrency Labs Ltd

About this talk

AWS infrastructure offers robust native security mechanisms, but the shared responsibility model places critical configuration burdens on app owners. This creates gaps that attackers can actively exploit through misconfigurations, privilege escalation, and cross-service vulnerabilities which can compromise entire cloud deployments. Security automation emerges as an essential defense strategy for threat modeling, enabling businesses to enforce security best practices from deployment through ongoing operations. Automated security controls provide continuous monitoring, real-time threat detection, and optimized remediation across AWS services. This ensures a consistent security posture while reducing human error and response times. Join Ernesto Marquez, Founder and Project Director at Concurrency Labs, to explore proven AWS security automation strategies for threat mitigation. Key Takeaways: - Implement automated security controls that enforce best practices across AWS services - Deploy continuous monitoring and real-time threat detection for multicloud environments - Configure automated remediation workflows for common security vulnerabilities - Integrate AWS security automation tools into comprehensive threat modeling frameworks - Establish governance policies that maintain security consistency across cloud deployments
Information Security

Information Security

259015 subscribers731 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics