Vendor Profile
-
Evolving your security capabilities through key growth stages
You may know what key security capabilities your startup needs, but this session will help you establish which stage of…
Read More » -
Zero-privilege operations: Running services without access to data
In this session, learn how AWS secures data, even from trusted AWS operators and services.
Read More » -
Harness power of IAM policies & rein in permissions w/Access Analyzer
Explore the power of IAM policies and discover how to use IAM Access Analyzer to set, verify, and refine permissions.
Read More » -
Threat Detection and Incident Response using Cloud-native Services
In this session, explore how cloud-native services can be used to support threat detection and incident response processes in AWS…
Read More » -
AWS Well-Architected Framework security pillar: Cloud security @ scale
Learn about the AWS Support–led Security Improvement Program (SIP) that can help you identify security risks and process gaps in…
Read More »