Managing Threat Detection and Response for Securing AWS

Alert Logic

Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy? Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.
Watch Now

Spotlight

It’s a technology evolution and a behavioral revolution. For the first time ever, mobile devices are outselling PCs2 ; organizations are embracing cloud technology for their corporate data and business applications. The unprecedented amounts of information generated by this new age connectivity is being analyzed by organizations to empower critical decision-making, capture new market opportunities, reduce customer churn and generate operational efficiencies. Information - its availability, access and control - is considered a core strategic asset. And organizations know the value in securing and protecting it.

OTHER ON-DEMAND WEBINARS

Cybersecurity knowledge gap not uniform across sectors

Hrdive

Workers in finance know more than workers in other industries about cubersecurity, according to a report from Proofpoint. After analyzing more than 100 million answers to cybersecurity questions from employees in 16 industries, Proofpoint found that finance workers answered 80% of questions correctly. Transportation and education sector workers had the least knowledge among the various sectors, answering 24% of questions correctly on average, Proofpoint determined.
Watch Now

Ensuring Security Value through Outcome-based MDR

Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection against threats and as the scale and complexit
Watch Now

Moving Beyond Blindspots: How to Reduce Security Risks in the Cloud

Understanding your complex cloud environment is tricky. Workloads, containers, and serverless functions are added and removed constantly. Vulnerabilities are endless. Security staff is in short supply. But here’s the reality: cloud security is built in incremental steps. And process improvement involves multiple stakeholders — not just security teams.
Watch Now

Global Threat Report: The Year of the Next-Gen Cyberattack

Carbon Black

2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever attackers have become in evolving to remain undetected — using techniques such as lateral movement, island hopping and counter incident response to stay invisible. Join our discussion on the latest in threat intelligence including: The most prevalent ransomware and commodity malware families during the past year. Why we're seeing increases in nation-state cyberattacks.
Watch Now

Spotlight

It’s a technology evolution and a behavioral revolution. For the first time ever, mobile devices are outselling PCs2 ; organizations are embracing cloud technology for their corporate data and business applications. The unprecedented amounts of information generated by this new age connectivity is being analyzed by organizations to empower critical decision-making, capture new market opportunities, reduce customer churn and generate operational efficiencies. Information - its availability, access and control - is considered a core strategic asset. And organizations know the value in securing and protecting it.

resources