AWS Summit Online ANZ 2022 | InfoSec
Scaling your environment securely with AWS Control Tower (Level 200 | Intermediate)
AWS Control Tower offers the easiest way to set up and govern a new, secure, multi-account AWS environment based on AWS best practices. This session covers best practices for new deployments as...
Application identity! Securing your app using Amazon Cognito (Level 400 | Experts)
Authentication and fine-grained authorisation are crucial to building secure applications. Without the right identity and access management system, securing access to your application can be...
Security best practices the well-architected way (Level 400 | Experts)
As you continually evolve your use of the AWS platform, it’s important to consider ways to improve your security posture and take advantage of new security services and features. In this advanced...
Patch it up! Building a vulnerability management solution (Level 300 | Advanced)
With thousands of new Common Vulnerabilities and Exposures (CVEs) are discovered every month, customers have told us that they struggle to keep on top of their security using traditional...
- Back to Home
Scaling security – Optimise for fast and secure delivery (Level 200 | Intermediate)
As organisations grow, security does not scale unless it’s everyone's job. To enable this, you can optimise your security capabilities such that product teams own their own security, and evolve the...
Real world ransom attacks in AWS and how to mitigate them (Level 200 | Intermediate)
Ransomware poses a real threat to the data of all businesses in all verticals. The impacts from data loss, public reputation damage, and lost productivity can be large. In this session, we walk...
Managing identities and access across AWS accounts (Level 300 | Advanced)
WS customers from all industries have been adopting AWS SSO to improve their security posture and improve productivity by providing a central pane of glass for users’ assigned accounts and...
Effective security for modern applications (Level 200 | Intermediate)
How should we think about security for modern applications running in the cloud? In this session, we cover an understanding of modern applications and recommend the approach to address security...