Limiting Access Rights On AWS

"AWS Identity and Access Management is an great feature for providing access to AWS resources - but how do you manage those rights well?

In this video you will learn
- AWS IAM strategies for limiting your security exposure
- a path to apply security to new or existing AWS infrastructure
- how Evident.io can help "
Watch Now

Spotlight

"How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program? Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced."


OTHER ON-DEMAND WEBINARS

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.

"The Known and Unknown Costs of DDoS"

Akamai

"Criminals are increasingly turning to cyber-crime as their method of choice, thanks to the increased accessibility provided by numerous automated attack tools and ‘for hire’ subscription services. The number of Distributed Denial of Service (DDoS) attacks against organisation’s websites, for example, are increasing rapidly and the true business costs are often unknown. In addition to the more obvious impacts associated with the lost web transactions associated with downtime, there are also reputational and other ephemeral costs that are harder to quantify. We’ll be examining both the monetary and reputational costs of an attack on your infrastructure, as well some of the measures you can take to combat these attacks. With data drawn from Akamai’s State of the Internet Report, we’ll be talking about real world examples of attacks and how these could affect your business. "

Applied Security Analytics

Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.

Security and the Changing Value of our Data

Juniper Networks

We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed. Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value.

Spotlight

"How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program? Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced."

resources