AWS Summit Online ANZ 2021 | Infosec

  • The simplest security steps for AWS28:17

    The simplest security steps for AWS

    Do you want to know the easiest, most effective ways to secure your AWS workloads?

    Watch Video
  • Using the Well-Architected Framework to secure your AWS environment24:02

    Using the Well-Architected Framework to secure your AWS environment

    The AWS Well-Architected Framework helps you apply best practices and recommendations in the design, delivery, and maintenance of secure AWS workloads. In this session, hear how KINNECT (an AWS custom

    Watch Video
  • Building an effective governance and compliance strategy using AWS Audit Manager32:14

    Building an effective governance and compliance strategy using AWS Audit Manager

    Incorporating AWS best practices for governance makes it easy for your organisation to focus on building and innovating with the confidence of continuous compliance.

    Watch Video
  • Practical security incident response on AWS28:55

    Practical security incident response on AWS

    In this session, AWS and SEEK talk about the foundations and practical implementation of incident response in AWS.

    Watch Video
  • AWS Summit Online 2021

    Back to Home
  • AWS Network Firewall and network security in Amazon VPC23:07

    AWS Network Firewall and network security in Amazon VPC

    AWS launched a number of new network security focused services and features in 2020. In this session, learn about AWS Network Firewall, AWS Gateway Load Balancer, and related features.

    Watch Video
  • DDoS protection and response automation29:26

    DDoS protection and response automation

    AWS Shield is a service that is capable of mitigating and absorbing DDoS attacks of a terabit scale.

    Watch Video
  • Optimise security operations using AWS Systems Manager31:19

    Optimise security operations using AWS Systems Manager

    Do you have a growing number of Amazon EC2 instances spread across an increasing number of AWS accounts or regions, which are becoming harder to secure and operate? This session shows you how AWS Syst

    Watch Video
  • AWS Nitro Enclaves: Isolated compute environments to protect highly confidential data30:08

    AWS Nitro Enclaves: Isolated compute environments to protect highly confidential data

    AWS customers that need to process highly sensitive data on the AWS cloud can address this challenge today with AWS Nitro Enclaves, an isolated, hardened, and highly constrained compute environment, d

    Watch Video
  • Starting your AWS IAM journey28:40

    Starting your AWS IAM journey

    The AWS Identity and Access Management (IAM) service offers a range of policy types to build out a secure cloud environment.

    Watch Video
  • How to approach threat modelling29:43

    How to approach threat modelling

    One of the foundational security best practices within the AWS Well-Architected security pillar is to ‘identify and prioritise risks using a threat model’.

    Watch Video
  • loading
    Loading More...