AWS Summit Online ANZ 2021 | Infosec
-
28:17
The simplest security steps for AWS
Do you want to know the easiest, most effective ways to secure your AWS workloads?
-
24:02
Using the Well-Architected Framework to secure your AWS environment
The AWS Well-Architected Framework helps you apply best practices and recommendations in the design, delivery, and maintenance of secure AWS workloads. In this session, hear how KINNECT (an AWS custom
-
32:14
Building an effective governance and compliance strategy using AWS Audit Manager
Incorporating AWS best practices for governance makes it easy for your organisation to focus on building and innovating with the confidence of continuous compliance.
-
28:55
Practical security incident response on AWS
In this session, AWS and SEEK talk about the foundations and practical implementation of incident response in AWS.
-
AWS Summit Online 2021
Back to Home -
23:07
AWS Network Firewall and network security in Amazon VPC
AWS launched a number of new network security focused services and features in 2020. In this session, learn about AWS Network Firewall, AWS Gateway Load Balancer, and related features.
-
29:26
DDoS protection and response automation
AWS Shield is a service that is capable of mitigating and absorbing DDoS attacks of a terabit scale.
-
31:19
Optimise security operations using AWS Systems Manager
Do you have a growing number of Amazon EC2 instances spread across an increasing number of AWS accounts or regions, which are becoming harder to secure and operate? This session shows you how AWS Syst
-
30:08
AWS Nitro Enclaves: Isolated compute environments to protect highly confidential data
AWS customers that need to process highly sensitive data on the AWS cloud can address this challenge today with AWS Nitro Enclaves, an isolated, hardened, and highly constrained compute environment, d
-
28:40
Starting your AWS IAM journey
The AWS Identity and Access Management (IAM) service offers a range of policy types to build out a secure cloud environment.
-
29:43
How to approach threat modelling
One of the foundational security best practices within the AWS Well-Architected security pillar is to ‘identify and prioritise risks using a threat model’.
-
Loading More...