7-Step Process to Secure AWS and Custom Applications

  • Wednesday, 25 Oct 2017 3:30PM EDT (25 Oct 2017 19:30 UTC)
  • Speakers: John Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan

In the wake of the massive Verizon, Dow Jones, and RNC data exposures, IT Security is increasingly aware of the need to secure data in IaaS Platforms, like AWS and Azure, and custom applications running on IaaS. '

Join John Pescatore of the SANS Institute, Niraj Patel of Horizon Blue Cross Blue Shield, and'skyhigh Networks for a fast-paced session covering the challenges IT Security faces when utilizing AWS across the enterprise and how they are auditing security configurations, detecting threats, and enforce data loss prevention policies for IaaS and custom apps using a Cloud Access Security Broker (CASB).

This webinar will include a live product demonstration of the Skyhigh Cloud Access Security Broker covering use cases including:

  1. Audit AWS to Identify and Correct Unsecure/Noncompliant Configurations
  2. Detect Compromised Account and Malicious Insider working with AWS
  3. Extend DLP, Access Control, Threat Detection to Custom Apps