Enviar búsqueda
Cargar
AWS Summit Tel Aviv - Security Keynote
•
0 recomendaciones
•
614 vistas
Amazon Web Services
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 85
Descargar ahora
Descargar para leer sin conexión
Recomendados
AWS Summit Tel Aviv - Startup Track - Architecting for High Availability
AWS Summit Tel Aviv - Startup Track - Architecting for High Availability
Amazon Web Services
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
Amazon Web Services
Amazon EC2
Amazon EC2
Amazon Web Services
Customer Sharing: Trend Micro - Trend Micro's DevOps Practices
Customer Sharing: Trend Micro - Trend Micro's DevOps Practices
Amazon Web Services
SEC307 Automating Security and Compliance Response in the Cloud
SEC307 Automating Security and Compliance Response in the Cloud
Amazon Web Services
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
Amazon Web Services
Visualising Your Data Insights with Amazon QuickSight
Visualising Your Data Insights with Amazon QuickSight
Amazon Web Services
AWS Summit London 2016 Keynote
AWS Summit London 2016 Keynote
Amazon Web Services
Recomendados
AWS Summit Tel Aviv - Startup Track - Architecting for High Availability
AWS Summit Tel Aviv - Startup Track - Architecting for High Availability
Amazon Web Services
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
Amazon Web Services
Amazon EC2
Amazon EC2
Amazon Web Services
Customer Sharing: Trend Micro - Trend Micro's DevOps Practices
Customer Sharing: Trend Micro - Trend Micro's DevOps Practices
Amazon Web Services
SEC307 Automating Security and Compliance Response in the Cloud
SEC307 Automating Security and Compliance Response in the Cloud
Amazon Web Services
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
AWS Summit Manila - Opening Keynote by Dr. Werner Vogels
Amazon Web Services
Visualising Your Data Insights with Amazon QuickSight
Visualising Your Data Insights with Amazon QuickSight
Amazon Web Services
AWS Summit London 2016 Keynote
AWS Summit London 2016 Keynote
Amazon Web Services
DevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous Deployment
Amazon Web Services
Build a Serverless Web Application in One Day
Build a Serverless Web Application in One Day
Amazon Web Services
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Helen Rogers
Migrating the GoPro Plus Cloud Service to Amazon ECS
Migrating the GoPro Plus Cloud Service to Amazon ECS
Amazon Web Services
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
Amazon Web Services
Getting Started with AWS Mobile Services
Getting Started with AWS Mobile Services
Amazon Web Services
How to Sell Serverless to Your Colleagues
How to Sell Serverless to Your Colleagues
Subbu Allamaraju
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
Amazon Web Services
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
Amazon Web Services
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
Amazon Web Services
What's New
What's New
Amazon Web Services
The Lean Enterprise
The Lean Enterprise
Amazon Web Services
Accelerate Your Mobile Development Journey with AWS
Accelerate Your Mobile Development Journey with AWS
Amazon Web Services
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
Amazon Web Services
Big Data & Analytics: End to End on AWS - Technical 101
Big Data & Analytics: End to End on AWS - Technical 101
Amazon Web Services
Opening Keynote - AWS Summit SG 2017
Opening Keynote - AWS Summit SG 2017
Amazon Web Services
AWS re:Invent 2017 re:View
AWS re:Invent 2017 re:View
Mark Nunnikhoven
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
Amazon Web Services
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
Amazon Web Services
Building Your First Big Data Application on AWS
Building Your First Big Data Application on AWS
Amazon Web Services
AWS Summit Barcelona - Security Keynote
AWS Summit Barcelona - Security Keynote
Amazon Web Services
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
Amazon Web Services
Más contenido relacionado
La actualidad más candente
DevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous Deployment
Amazon Web Services
Build a Serverless Web Application in One Day
Build a Serverless Web Application in One Day
Amazon Web Services
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Helen Rogers
Migrating the GoPro Plus Cloud Service to Amazon ECS
Migrating the GoPro Plus Cloud Service to Amazon ECS
Amazon Web Services
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
Amazon Web Services
Getting Started with AWS Mobile Services
Getting Started with AWS Mobile Services
Amazon Web Services
How to Sell Serverless to Your Colleagues
How to Sell Serverless to Your Colleagues
Subbu Allamaraju
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
Amazon Web Services
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
Amazon Web Services
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
Amazon Web Services
What's New
What's New
Amazon Web Services
The Lean Enterprise
The Lean Enterprise
Amazon Web Services
Accelerate Your Mobile Development Journey with AWS
Accelerate Your Mobile Development Journey with AWS
Amazon Web Services
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
Amazon Web Services
Big Data & Analytics: End to End on AWS - Technical 101
Big Data & Analytics: End to End on AWS - Technical 101
Amazon Web Services
Opening Keynote - AWS Summit SG 2017
Opening Keynote - AWS Summit SG 2017
Amazon Web Services
AWS re:Invent 2017 re:View
AWS re:Invent 2017 re:View
Mark Nunnikhoven
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
Amazon Web Services
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
Amazon Web Services
Building Your First Big Data Application on AWS
Building Your First Big Data Application on AWS
Amazon Web Services
La actualidad más candente
(20)
DevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous Deployment
Build a Serverless Web Application in One Day
Build a Serverless Web Application in One Day
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Migrating the GoPro Plus Cloud Service to Amazon ECS
Migrating the GoPro Plus Cloud Service to Amazon ECS
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
Getting Started with AWS Mobile Services
Getting Started with AWS Mobile Services
How to Sell Serverless to Your Colleagues
How to Sell Serverless to Your Colleagues
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
Keynote - Digital Innovation with AWS - Approach to Building Security Service...
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
What's New
What's New
The Lean Enterprise
The Lean Enterprise
Accelerate Your Mobile Development Journey with AWS
Accelerate Your Mobile Development Journey with AWS
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
Big Data & Analytics: End to End on AWS - Technical 101
Big Data & Analytics: End to End on AWS - Technical 101
Opening Keynote - AWS Summit SG 2017
Opening Keynote - AWS Summit SG 2017
AWS re:Invent 2017 re:View
AWS re:Invent 2017 re:View
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
台灣客戶經驗分享: 零售品牌全通路經營-數位轉型新挑戰
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
SQL Strikes Back! Options for Large Scale SQL Analytics - AWS Summit SG 2017...
Building Your First Big Data Application on AWS
Building Your First Big Data Application on AWS
Similar a AWS Summit Tel Aviv - Security Keynote
AWS Summit Barcelona - Security Keynote
AWS Summit Barcelona - Security Keynote
Amazon Web Services
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
Amazon Web Services
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
Amazon Web Services
Getting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
Security and Compliance
Security and Compliance
Amazon Web Services
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
GSTF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
James Strong
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Amazon Web Services
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
Amazon Web Services
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
Joseph Holbrook, Chief Learning Officer (CLO)
T4 – Understanding aws security
T4 – Understanding aws security
Amazon Web Services
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
Amazon Web Services
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
Amazon Web Services
AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016
Amazon Web Services
Security Innovations in the Cloud
Security Innovations in the Cloud
Amazon Web Services
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
DevSecCon
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
Cynthia Hsieh
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Amazon Web Services
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
Ștefan Popa
Similar a AWS Summit Tel Aviv - Security Keynote
(20)
AWS Summit Barcelona - Security Keynote
AWS Summit Barcelona - Security Keynote
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
Getting Started with AWS Security
Getting Started with AWS Security
Security and Compliance
Security and Compliance
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
T4 – Understanding aws security
T4 – Understanding aws security
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016
Security Innovations in the Cloud
Security Innovations in the Cloud
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
Más de Amazon Web Services
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
Open banking as a service
Open banking as a service
Amazon Web Services
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
Computer Vision con AWS
Computer Vision con AWS
Amazon Web Services
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
Tools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
How to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
Building a web application without servers
Building a web application without servers
Amazon Web Services
Fundraising Essentials
Fundraising Essentials
Amazon Web Services
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
Más de Amazon Web Services
(20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Open banking as a service
Open banking as a service
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Computer Vision con AWS
Computer Vision con AWS
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Tools for building your MVP on AWS
Tools for building your MVP on AWS
How to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Building a web application without servers
Building a web application without servers
Fundraising Essentials
Fundraising Essentials
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Último
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Último
(20)
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
AWS Summit Tel Aviv - Security Keynote
1.
AWS Summit 2013
Tel Aviv Oct 16 – Tel Aviv, Israel AWS CLOUD SECURITY Carlos Conde Sr. Mgr. Solutions Architecture
2.
SECURITY IS UNIVERSAL
3.
EVERY CUSTOMER HAS
ACCESS TO THE SAME SECURITY CAPABILITIES CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS
4.
AWS GOV CLOUD ITAR
COMPLIANT
5.
SECURITY IS VISIBLE
6.
CAN YOU MAP
YOUR NETWORK? WHAT IS IN YOUR ENVIRONMENT RIGHT NOW?
7.
8.
9.
AWS API +
CLOUDFORMER ENVIRONMENT ARCHITECTURE DEFINITION AND CHANGE DETECTION
10.
SECURITY IS TRANSPARENT
11.
SOC 1 SOC 2 ITAR SOC
3 FIPS PCI DSS L1 FedRAMP ISO 27001 HIPAA
12.
SECURITY IS FAMILIAR
13.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
14.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
15.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
16.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
17.
LEAST PRIVILEGE PRINCIPLE CONFINE
ROLES ONLY TO THE MATERIAL REQUIRED TO DO A SPECIFIC WORK
18.
USE AWS IAM IDENTITY
& ACCESS MANAGEMENT
19.
CONTROL WHO CAN
DO WHAT IN YOUR AWS ACCOUNT
20.
21.
22.
23.
IAM USERS &
ROLES
24.
ACCESS TO SERVICE APIs
25.
NO PASSWORDS
26.
USE SEPARATE SETS
OF CREDENTIALS
27.
ROTATE YOUR AWS
SECURITY CREDENTIALS
28.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
29.
YOUR DATA IS
YOUR MOST IMPORTANT ASSET IF YOUR DATA IS NOT SECURE, YOU’RE NOT SECURE
30.
31.
…
32.
MFA DELETE PROTECTION
33.
34.
ENCRYPT YOUR DATA AMAZON
S3 SSE DATA AT REST AWS CLOUDHSM
35.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
36.
NEED TO KNOW + CCTV,
GUARDS, MAN TRAPS, FENCES, ETC…
37.
…
38.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
39.
CHANGES IN PRODUCTION HAVE
TO BE AUTHORIZED
40.
DEV & TEST PRODUCTION ENVIRONMENT ENVIRONMENT AWS
ACCOUNT A AWS ACCOUNT B
41.
DEPLOYMENT PROCESS HAS TO
BE CONSTRAINED
42.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
43.
CONTINUOUS DELIVERY MODEL
44.
CONTINUOUS DEPLOYMENT SESSION 13:30 START-UP
TRACK
45.
REDUNDANCY & INTEGRITY CHECKS
46.
USE MULTIPLE AZs AMAZON
S3 AMAZON DYNAMODB AMAZON RDS MULTI-AZ AMAZON EBS SNAPSHOTS
47.
SOC CONTROL OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. SECURITY
ORGANIZATION AMAZON USER ACCESS LOGICAL SECURITY SECURE DATA HANDLING PHYSICAL SECURITY AND ENV. SAFEGUARDS CHANGE MANAGEMENT DATA INTEGRITY, AVAILABILITY AND REDUNDANCY INCIDENT HANDLING
48.
“GAME DAYS” INSERT ARTIFICIAL
SECURITY INCIDENTS. MEASURE SPEED OF DETECTION AND EXECUTION.
49.
GAME DAYS !! INSERT
ARTIFICIAL SECURITY INCIDENTS. MEASURE SPEED OF DETECTION AND EXECUTION.
50.
51.
SECURITY IS AUDITABLE
52.
53.
VULNERABILITY / PENETRATION TESTING
54.
VULNERABILITY / PENETRATION TESTING
55.
LOGS OBTAINED, RETAINED, ANALYZED
56.
OBTAIN, RETAIN, ANALYSE YOUR
LOGS
57.
58.
59.
PROTECT YOUR LOGS
WITH IAM ARCHIVE YOUR LOGS
60.
61.
62.
TRUSTED ADVISOR
63.
64.
65.
66.
SECURITY IS SHARED
67.
NETWORK SECURITY: DDOS
68.
NETWORK SECURITY: SSL
69.
NETWORK SECURITY: SPOOFING
70.
NETWORK SECURITY: PORT SCANNING
71.
AMAZON EC2 SECURITY: HOST
OS SSH KEYED LOGINS VIA BASTION HOST ALL ACCESSES LOGGED AND AUDITED
72.
AMAZON EC2 SECURITY: GUEST
OS CUSTOMER CONTROLLED AT ROOT LEVEL AWS ADMINS CANNOT LOG IN CUSTOMER-GENERATED KEYPAIRS
73.
“If you need
to SSH into your instance, your deployment process is broken.”
74.
AMAZON EC2 SECURITY: STATEFUL
& STATELESS FIREWALL MANDATORY INBOUND DEFAULT DENY MODE
75.
76.
77.
78.
79.
80.
SECURITY IS UNIVERSAL VISIBLE TRANSPARENT FAMILIAR AUDITABLE SHARED
81.
AWS.AMAZON.COM / SECURITY
82.
83.
AWS SECURITY WHITEPAPERS AUDITING
SECURITY CHECKLIST SECURITY BEST PRACTICES SECURITY PROCESSES RISK & COMPLIANCE
84.
AWS MARKETPLACE SECURITY SOLUTIONS
Descargar ahora