Vendor Profile
-
Device Posture Security | NordLayer
NordLayer’s Device Posture Security diligently checks and validates each device, safeguarding your organizational network from unauthorized and non-compliant devices.
Read More » -
Torq Hyperautomation Reinvents Security Case Management
The new Torq Hyperautomation platform was purpose-built from the ground up to deliver the comprehensive Case Management capabilities SecOps have…
Read More » -
Introduction to AWS Network Firewall
AWS Network Firewall provides organizations using AWS with a centralized method to implement security measures and policies across VPCs and…
Read More » -
Managed SIEM: How to protect your business with detection & response
In this latest webinar Oliver Pinson-Roxburgh shares his thoughts on the importance of having a managed SIEM service.
Read More » -
Why Microsoft Uses AI to Fight Cyber Threats
Microsoft Vice President and Security CMO Vasu Jakkal joins Ed Ludlow to discuss how AI is ingrained in the company’s…
Read More » -
Evolving your security capabilities through key growth stages
You may know what key security capabilities your startup needs, but this session will help you establish which stage of…
Read More » -
Zero-privilege operations: Running services without access to data
In this session, learn how AWS secures data, even from trusted AWS operators and services.
Read More » -
Harness power of IAM policies & rein in permissions w/Access Analyzer
Explore the power of IAM policies and discover how to use IAM Access Analyzer to set, verify, and refine permissions.
Read More » -
Threat Detection and Incident Response using Cloud-native Services
In this session, explore how cloud-native services can be used to support threat detection and incident response processes in AWS…
Read More » -
AWS Well-Architected Framework security pillar: Cloud security @ scale
Learn about the AWS Support–led Security Improvement Program (SIP) that can help you identify security risks and process gaps in…
Read More »