AWS offers extensive logging capabilities with services including Amazon Simple Storage Service (S3), Amazon Elastic Load Balancing (ELB), and Amazon CloudTrail. Yet when meeting compliance standards such as the Payment Card Industry Data Security Standard (PCI DSS), it can be challenging to process a large amount of log data in a short amount of time to produce audit-ready reports.
USM Anywhere from AlienVault provides a comprehensive threat detection and compliance solution for monitoring cloud and on-premises environments. Join our webinar to hear from security experts from AWS and AlienVault, along with AlienVault customer CeloPay, who will discuss the essential compliance capabilities provided by the AlienVault solution.
Securing Your Desktops with Amazon WorkSpaces - AWS Online Tech Talks Amazon Web Services
End-user security is a constant challenge for IT leaders who must balance the business needs of BYOD, distributed workforce, and ready access to business resources, against protecting those same resources from hackers and malware. Amazon WorkSpaces provides a more secure environment over conventional desktop infrastructure because data and applications reside in the cloud, is encrypted during I/O, at rest, and in snapshots, and is not located on end-user devices. In this tech talk we will discuss how you can better secure your IT infrastructure, intellectual property, and sensitive information, and provide recommendations for best practices to help you protect your desktop computing devices using a managed Desktop-as-a-Service (DaaS) solution.
End-User Computing on AWS with Amazon WorkSpaces and Amazon AppStream 2.0 - E...Amazon Web Services
IT organizations today need to support a modern, flexible, global workforce and ensure their users can be productive from anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance, with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and talk through best practices for moving your end-user computing to AWS. We also dive deep into Amazon AppStream 2.0, and demonstrate some of the newest capabilities, including Microsoft Active Directory integration, single sign-on with SAML 2.0, and new graphics instances.
AWS FSI Symposium 2017 NYC - Moving at the Speed of Serverless ft BroadridgeAmazon Web Services
AWS’ suite of serverless technology has enabled enterprises in Financial Services to move quickly from conception to reality. By leveraging AWS, you can run code without provisioning or managing servers—and you only pay for what you use. In this session, we will walk through how we worked with Broadridge to take their Experience Manager application from design to deployment and provide details around how numerous AWS services were leveraged, including Cognito, Lambda, S3, DynamoDB, and SES. We will also dive into how the use of serverless technology can enable developers to move quickly, while improving security postures, minimizing management, and simplifying operations.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
We've heard from our customers that using AWS allows them to operate even more securely than they could in their own data centres. Why is this? We will tackle the most commonly asked security & compliance questions customers ask when adopting the AWS Cloud. We will demonstrate practical ways to make sure you're operating securely, and hear first-hand from an AWS customer about how they are using the platform today and the importance of getting this right.
Speaker: Matthew Jobson, Account Manager, Amazon Web Services & Ben Chung, Head of Security Assurance, Amazon Web Services, APAC
Featured Customer - Health Direct Australia
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
GPSWKS409_GPS Accelerating Your Portfolio Migration to AWS Using AWS Migratio...Amazon Web Services
AWS and AWS Partners offer a variety of tools and services to help customers accelerate the migration of their existing portfolios to AWS. In this session, learn how to leverage AWS Migration Hub to understand your IT portfolio, and view and track the progress of application migrations. In addition, learn how to collect and view data about on-premises resources, group those resources into applications, and monitor progress as applications are migrated to AWS. To get the most out of this session, you will need to bring a laptop for the lab and have registered for a QwikLabs account.
Our appetite for cloud transformation is continuously growing in Hong Kong and across the Asia Pacific region. Find out how companies have embarked on this transformation journey and their successes and lessons learnt along the way. Discover how Datapipe’s sophisticated and proven hybrid cloud services have allowed customers to enjoy a wide range of operational and cost saving benefits.
Securing Your Desktops with Amazon WorkSpaces - AWS Online Tech Talks Amazon Web Services
End-user security is a constant challenge for IT leaders who must balance the business needs of BYOD, distributed workforce, and ready access to business resources, against protecting those same resources from hackers and malware. Amazon WorkSpaces provides a more secure environment over conventional desktop infrastructure because data and applications reside in the cloud, is encrypted during I/O, at rest, and in snapshots, and is not located on end-user devices. In this tech talk we will discuss how you can better secure your IT infrastructure, intellectual property, and sensitive information, and provide recommendations for best practices to help you protect your desktop computing devices using a managed Desktop-as-a-Service (DaaS) solution.
End-User Computing on AWS with Amazon WorkSpaces and Amazon AppStream 2.0 - E...Amazon Web Services
IT organizations today need to support a modern, flexible, global workforce and ensure their users can be productive from anywhere. Moving desktops and applications to AWS offers improved security, scale, and performance, with cloud economics. In this session, we provide an overview of Amazon WorkSpaces and Amazon AppStream 2.0, and talk through best practices for moving your end-user computing to AWS. We also dive deep into Amazon AppStream 2.0, and demonstrate some of the newest capabilities, including Microsoft Active Directory integration, single sign-on with SAML 2.0, and new graphics instances.
AWS FSI Symposium 2017 NYC - Moving at the Speed of Serverless ft BroadridgeAmazon Web Services
AWS’ suite of serverless technology has enabled enterprises in Financial Services to move quickly from conception to reality. By leveraging AWS, you can run code without provisioning or managing servers—and you only pay for what you use. In this session, we will walk through how we worked with Broadridge to take their Experience Manager application from design to deployment and provide details around how numerous AWS services were leveraged, including Cognito, Lambda, S3, DynamoDB, and SES. We will also dive into how the use of serverless technology can enable developers to move quickly, while improving security postures, minimizing management, and simplifying operations.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
We've heard from our customers that using AWS allows them to operate even more securely than they could in their own data centres. Why is this? We will tackle the most commonly asked security & compliance questions customers ask when adopting the AWS Cloud. We will demonstrate practical ways to make sure you're operating securely, and hear first-hand from an AWS customer about how they are using the platform today and the importance of getting this right.
Speaker: Matthew Jobson, Account Manager, Amazon Web Services & Ben Chung, Head of Security Assurance, Amazon Web Services, APAC
Featured Customer - Health Direct Australia
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs. We will ensure you have an AWS account and understand EC2, prepare you to get set up on the AWS Command Line Interface (CLI) to access the AWS Management Console, introduce you to in source repositories, discuss SSH access and necessary SDKs, and more.
GPSWKS409_GPS Accelerating Your Portfolio Migration to AWS Using AWS Migratio...Amazon Web Services
AWS and AWS Partners offer a variety of tools and services to help customers accelerate the migration of their existing portfolios to AWS. In this session, learn how to leverage AWS Migration Hub to understand your IT portfolio, and view and track the progress of application migrations. In addition, learn how to collect and view data about on-premises resources, group those resources into applications, and monitor progress as applications are migrated to AWS. To get the most out of this session, you will need to bring a laptop for the lab and have registered for a QwikLabs account.
Our appetite for cloud transformation is continuously growing in Hong Kong and across the Asia Pacific region. Find out how companies have embarked on this transformation journey and their successes and lessons learnt along the way. Discover how Datapipe’s sophisticated and proven hybrid cloud services have allowed customers to enjoy a wide range of operational and cost saving benefits.
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy environments. We'll take a look at several reference architectures for common workloads and highlight the innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the shared security responsibility model and understand how to benefit from controls from the rich compliance and accreditation programs maintained by AWS. Speaker: Stephen Quigg, Solutions Architect, Amazon Web Services
In this session, we explore different approaches to migrating Microsoft applications to AWS. We walk through important considerations when planning a migration, and we show how to develop and implement a migration plan to move applications from on-premises (or traditional hosting) to AWS. We use a case study format to dive deep into successfully planning an application migration. Participants work in teams to plan a SharePoint migration that integrates with an existing Active Directory.
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneAmazon Web Services
With customers migrating workloads to AWS, we are starting to see a need for the creation of a prescribed landing zone, which uses native AWS capabilities and meets or exceeds customers' security and compliance objectives. In this session, we will describe an AWS landing zone and explain features for account structuring, user configuration, provisioning, networking and operation automation. The Migration Landing Zone solution is based on AWS native capabilities such as AWS Service Catalog, AWS Identity and Access Management, AWS Config Rules, AWS CloudTrail and AWS Lambda. We will provide an overview of AWS Service Catalog and how it be used to provide self-service infrastructure to applications users, including various options for automation. After this session you will be able to configure an AWS landing zone for successful large scale application migrations.
Speaker: Koen Biggelaar, Senior Manager, Solutions Architecture, Amazon Web Services and Mahmoud ElZayet
Because of AWS’ scale, customers inherit the robust security protocols AWS employs in their own data centers. Protecting our customers’ data is our first priority and we have architected our data centers to operate securely. We also offer numerous services so that customers running on AWS can build specific cloud-enabled solutions that improve security and can provide greater protection than on premises.
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDSAmazon Web Services
You can significantly reduce database licensing and operational costs by migrating from commercial database engines to Amazon RDS. In addition, you can gain flexibility and operational efficiency by avoiding the frustrating usage constraints that accompany commercial database licenses. Amazon RDS is a fully managed database service, so you no longer need to worry about complex database management tasks. Launch a single database instance or thousands of them in just a few minutes, and pay only for what you use. Learn how AWS Database Migration Service and AWS Schema Conversion Tool help you migrate commercial databases like Oracle and Microsoft SQL Server to Amazon RDS and Aurora easily and securely with minimal downtime.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance.
In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
Inside the IC Marketplace | AWS Public Sector Summit 2017Amazon Web Services
At AWS, we partner with the best to deliver the best to our customers. In this session, attendees learn how C2S and the C2S Partner Ecosystem work together to accelerate innovation and return time to the mission. This session will give you an update on the Intelligence Community (IC) Marketplace in C2S, including additional vendors, offerings, and changes to streamline the onboarding and procurement process. Learn More: https://aws.amazon.com/government-education/
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
Warum ist Cloud-Sicherheit und Compliance wichtig?AWS Germany
Wer seine IT-Projekte in die Cloud bringen möchte, muss auf ein paar Fallstricke achten. Herausforderungen finden Sie vor allem im Bereich der Sicherheit. Ihre Daten müssen vor dem Zugriff Unberechtigter absolut sicher sein. Trotzdem muss das Zugriffsmanagement für Ihre Mitarbeiter gut funktionieren. Zu diesen technischen Aufgaben kommen handfeste Vorgaben aus Ihren betrieblichen Richtlinien sowie wichtige gesetzliche Auflagen hinzu. Diese Compliance-Fragen sollten Sie unbedingt kennen und zuverlässig erfüllen. Denn nur, wenn Sie alle Compliance-Vorgaben korrekt einhalten, kann Ihr Cloud-Projekt ein voller Erfolg werden.
Keeping Security In-Step with your Application Demand CurveAmazon Web Services
Protecting dynamically scaled cloud compute resources can be challenging, especially for organizations that lack the time or money it takes to maintain dynamic security. Fortinet’s auto scaling security solution addresses this issue by providing the resources to help with deployment in order to optimize organizations’ AWS networks. Join the upcoming webinar hosted by Fortinet and AWS to learn how to leverage Fortinet for auto scaling complex security policies in your Amazon VPC. Fortinet has a broad set of capabilities that when combined with AWS services creates truly a complete security architecture.
Financial Services Firms are moving enterprise workloads to AWS to drive agility and innovation. Being regulated entities, firms need to ensure they have necessary controls in place to attain compliance with the industry regulations.
Find out how Cowen, a leader in diversified financial services, achieved a solution with CTP and AWS. With CTP’s Continuous Compliance for AWS managed service, Cowen has the confidence to move their workloads to AWS and can continuously monitor their applications in AWS against PCI and NIST compliance frameworks
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)Amazon Web Services
Becoming an Advanced Technology Partner or being included in an AWS Competency program are key achievements for AWS partners and distinguish them from their competitors in the market. Inclusion in these programs demonstrates a partner’s expertise across industry segments and technical domains, plus delivery of a solid product to their customers. The technical bar for becoming an APN Advanced partner or inclusion in an AWS Competency is high; partners must demonstrate both competency-relevant success and alignment with all four pillars of the AWS Well-Architected Framework. Join AWS Partner Solutions Architects as they outline what to expect from the process; describe how to best prepare for the conversation; and offer tips, tricks, and hints on how to get the most from the technical assessment process.
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
Today’s cutting-edge companies have software release cycles measured in days instead of months. This agility is enabled by the DevOps practice of continuous delivery, which automates building, testing, and deploying all code changes. This automation helps you catch bugs sooner and accelerates developer productivity. In this session, we’ll share the processes that Amazon’s engineers use to practice DevOps and discuss how you can bring these processes to your company by using a new set of AWS tools (AWS CodePipeline and AWS CodeDeploy). These services were inspired by Amazon's own internal developer tools and DevOps culture.
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
by Steve Laino, GRC Consultant, AWS
The Security Perspective of the AWS Cloud Adoption Framework (CAF) provides a framework for maturation via a structured program that incorporates best practices and processes to define, build, and optimize how you operate security controls in the AWS Cloud. The Security Perspective of the CAF provides a set of five core foundational themes designed to help you structure your selection and implementation of controls that are right for your business: AWS Identity and Access Management, detective controls, infrastructure security, data protection, and incident response. During this session, you will learn how to put the Security Perspective of the CAF into practice.
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...Amazon Web Services
Learn how cloud.gov can help you deliver on federal government agency missions. cloud.gov is a shared service, built by and for the federal government, designed to help you deploy modern web applications in the cloud with substantially reduced infrastructure and security compliance work. cloud.gov is a self-service, Platform as a Service solution that helps you: (1) easily move existing prototypes to a production-ready environment, with reduced “time to ATO”; (2) transfer existing applications from data centers to make them more scalable and reduce costs; and (3) advance your agency’s use of the cloud by providing a place to prototype in a FedRAMP-authorized environment. cloud.gov developers, 18F, will explain its capabilities, what applications are best suited for cloud.gov, pricing, and more practical details that you need. cloud.gov has a FedRAMP Joint Authorization Board (JAB) P-ATO at the Moderate level, and it leverages the AWS GovCloud FedRAMP JAB P-ATO. This session is for both government agency teams and commercial companies that support the federal government. No technical experience is necessary. Learn More: https://aws.amazon.com/government-education/
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
Security is a top priority to both AWS and its customers and many enterprises trust us with some of their most sensitive information, including financial, personal and health information. Learn about the key security features of AWS that these enterprise customers are using to build their own secure applications and secure and encrypt their content. We will also share how you can integrate AWS into your existing security policies and how partners like Trend Micro can help you extend this into the AWS Cloud.
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy environments. We'll take a look at several reference architectures for common workloads and highlight the innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the shared security responsibility model and understand how to benefit from controls from the rich compliance and accreditation programs maintained by AWS. Speaker: Stephen Quigg, Solutions Architect, Amazon Web Services
In this session, we explore different approaches to migrating Microsoft applications to AWS. We walk through important considerations when planning a migration, and we show how to develop and implement a migration plan to move applications from on-premises (or traditional hosting) to AWS. We use a case study format to dive deep into successfully planning an application migration. Participants work in teams to plan a SharePoint migration that integrates with an existing Active Directory.
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneAmazon Web Services
With customers migrating workloads to AWS, we are starting to see a need for the creation of a prescribed landing zone, which uses native AWS capabilities and meets or exceeds customers' security and compliance objectives. In this session, we will describe an AWS landing zone and explain features for account structuring, user configuration, provisioning, networking and operation automation. The Migration Landing Zone solution is based on AWS native capabilities such as AWS Service Catalog, AWS Identity and Access Management, AWS Config Rules, AWS CloudTrail and AWS Lambda. We will provide an overview of AWS Service Catalog and how it be used to provide self-service infrastructure to applications users, including various options for automation. After this session you will be able to configure an AWS landing zone for successful large scale application migrations.
Speaker: Koen Biggelaar, Senior Manager, Solutions Architecture, Amazon Web Services and Mahmoud ElZayet
Because of AWS’ scale, customers inherit the robust security protocols AWS employs in their own data centers. Protecting our customers’ data is our first priority and we have architected our data centers to operate securely. We also offer numerous services so that customers running on AWS can build specific cloud-enabled solutions that improve security and can provide greater protection than on premises.
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDSAmazon Web Services
You can significantly reduce database licensing and operational costs by migrating from commercial database engines to Amazon RDS. In addition, you can gain flexibility and operational efficiency by avoiding the frustrating usage constraints that accompany commercial database licenses. Amazon RDS is a fully managed database service, so you no longer need to worry about complex database management tasks. Launch a single database instance or thousands of them in just a few minutes, and pay only for what you use. Learn how AWS Database Migration Service and AWS Schema Conversion Tool help you migrate commercial databases like Oracle and Microsoft SQL Server to Amazon RDS and Aurora easily and securely with minimal downtime.
Learning Objectives:
- Learn how to enable users to access their AWS accounts and business applications using their corporate credentials
- Learn how to manage SSO access to all of your AWS accounts managed in AWS Organizations
- Learn how to centrally manage user permissions to AWS resources when they access the AWS Management Console using AWS SSO
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance.
In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
Inside the IC Marketplace | AWS Public Sector Summit 2017Amazon Web Services
At AWS, we partner with the best to deliver the best to our customers. In this session, attendees learn how C2S and the C2S Partner Ecosystem work together to accelerate innovation and return time to the mission. This session will give you an update on the Intelligence Community (IC) Marketplace in C2S, including additional vendors, offerings, and changes to streamline the onboarding and procurement process. Learn More: https://aws.amazon.com/government-education/
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
Warum ist Cloud-Sicherheit und Compliance wichtig?AWS Germany
Wer seine IT-Projekte in die Cloud bringen möchte, muss auf ein paar Fallstricke achten. Herausforderungen finden Sie vor allem im Bereich der Sicherheit. Ihre Daten müssen vor dem Zugriff Unberechtigter absolut sicher sein. Trotzdem muss das Zugriffsmanagement für Ihre Mitarbeiter gut funktionieren. Zu diesen technischen Aufgaben kommen handfeste Vorgaben aus Ihren betrieblichen Richtlinien sowie wichtige gesetzliche Auflagen hinzu. Diese Compliance-Fragen sollten Sie unbedingt kennen und zuverlässig erfüllen. Denn nur, wenn Sie alle Compliance-Vorgaben korrekt einhalten, kann Ihr Cloud-Projekt ein voller Erfolg werden.
Keeping Security In-Step with your Application Demand CurveAmazon Web Services
Protecting dynamically scaled cloud compute resources can be challenging, especially for organizations that lack the time or money it takes to maintain dynamic security. Fortinet’s auto scaling security solution addresses this issue by providing the resources to help with deployment in order to optimize organizations’ AWS networks. Join the upcoming webinar hosted by Fortinet and AWS to learn how to leverage Fortinet for auto scaling complex security policies in your Amazon VPC. Fortinet has a broad set of capabilities that when combined with AWS services creates truly a complete security architecture.
Financial Services Firms are moving enterprise workloads to AWS to drive agility and innovation. Being regulated entities, firms need to ensure they have necessary controls in place to attain compliance with the industry regulations.
Find out how Cowen, a leader in diversified financial services, achieved a solution with CTP and AWS. With CTP’s Continuous Compliance for AWS managed service, Cowen has the confidence to move their workloads to AWS and can continuously monitor their applications in AWS against PCI and NIST compliance frameworks
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)Amazon Web Services
Becoming an Advanced Technology Partner or being included in an AWS Competency program are key achievements for AWS partners and distinguish them from their competitors in the market. Inclusion in these programs demonstrates a partner’s expertise across industry segments and technical domains, plus delivery of a solid product to their customers. The technical bar for becoming an APN Advanced partner or inclusion in an AWS Competency is high; partners must demonstrate both competency-relevant success and alignment with all four pillars of the AWS Well-Architected Framework. Join AWS Partner Solutions Architects as they outline what to expect from the process; describe how to best prepare for the conversation; and offer tips, tricks, and hints on how to get the most from the technical assessment process.
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
Today’s cutting-edge companies have software release cycles measured in days instead of months. This agility is enabled by the DevOps practice of continuous delivery, which automates building, testing, and deploying all code changes. This automation helps you catch bugs sooner and accelerates developer productivity. In this session, we’ll share the processes that Amazon’s engineers use to practice DevOps and discuss how you can bring these processes to your company by using a new set of AWS tools (AWS CodePipeline and AWS CodeDeploy). These services were inspired by Amazon's own internal developer tools and DevOps culture.
This session will start with an overview of the AWS security & compliance programs that enable financial services institutions to create secure workloads as they move to the cloud. We will dive into Financial Services Institutions (FSI) specific security considerations and regional regulations that may need to be considered.
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
by Steve Laino, GRC Consultant, AWS
The Security Perspective of the AWS Cloud Adoption Framework (CAF) provides a framework for maturation via a structured program that incorporates best practices and processes to define, build, and optimize how you operate security controls in the AWS Cloud. The Security Perspective of the CAF provides a set of five core foundational themes designed to help you structure your selection and implementation of controls that are right for your business: AWS Identity and Access Management, detective controls, infrastructure security, data protection, and incident response. During this session, you will learn how to put the Security Perspective of the CAF into practice.
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...Amazon Web Services
Learn how cloud.gov can help you deliver on federal government agency missions. cloud.gov is a shared service, built by and for the federal government, designed to help you deploy modern web applications in the cloud with substantially reduced infrastructure and security compliance work. cloud.gov is a self-service, Platform as a Service solution that helps you: (1) easily move existing prototypes to a production-ready environment, with reduced “time to ATO”; (2) transfer existing applications from data centers to make them more scalable and reduce costs; and (3) advance your agency’s use of the cloud by providing a place to prototype in a FedRAMP-authorized environment. cloud.gov developers, 18F, will explain its capabilities, what applications are best suited for cloud.gov, pricing, and more practical details that you need. cloud.gov has a FedRAMP Joint Authorization Board (JAB) P-ATO at the Moderate level, and it leverages the AWS GovCloud FedRAMP JAB P-ATO. This session is for both government agency teams and commercial companies that support the federal government. No technical experience is necessary. Learn More: https://aws.amazon.com/government-education/
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
Security is a top priority to both AWS and its customers and many enterprises trust us with some of their most sensitive information, including financial, personal and health information. Learn about the key security features of AWS that these enterprise customers are using to build their own secure applications and secure and encrypt their content. We will also share how you can integrate AWS into your existing security policies and how partners like Trend Micro can help you extend this into the AWS Cloud.
Customers using AWS benefit from a multitude of security and compliance controls built into AWS solutions. In this session, you will learn how to take advantage of the advanced security features of AWS to gain the visibility, agility, and control that the cloud affords users over legacy environments. We will take a look at several reference architectures for common workloads and highlight the innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the Shared Responsibility Model and ways you can inherit security controls from the rich compliance and accreditation programs maintained by AWS.
Matt Johnson, Solutions Architect, AWS
Top 10 AWS Security and Compliance best practicesAhmad Khan
Learn how to secure your AWS from Hacks, and Misconfigurations. These 10 controls will lock down for all compliance regulations like HIPAA, PCI, FISMA, NIST and so on.
Whether you’re just beginning to explore cloud computing or adopting it at enterprise-scale, it is important to build security into your architecture. But where do you begin? This requires a thorough understanding of your shared security responsibilities as well as familiarity with the tools available to address these issues.
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...Amazon Web Services
As customers move to the cloud and become more agile, their expectations around the speed and efficiency of software procurement and fulfillment are increasing as a result. Consulting partners that deliver advisory, professional, and managed services to customers need to be able to purchase and deploy the required software solutions in days, not weeks. In this session, we explore how the software channel is evolving, including the economic and business forces that are creating change. This session benefits business leaders at Consulting Partners and ISVs, both partners new to AWS and existing partners, who will learn about AWS Marketplace's unique approach to enabling this evolution.
How Rent-A-Center Stays Secure and Compliant on AWS with Alert LogicAmazon Web Services
In this webinar, Alert Logic will talk about how you can protect your AWS workloads with their suite of security offerings in a matter of days instead of months, without having to hire additional staff. You’ll also learn how Rent-A-Center uses Alert Logic to comply with SOX and PCI, increase efficiency of security operations, and maintain a strong security posture on AWS.
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Amazon Web Services
In this session, Verizon and Stelligent demonstrate techniques and approaches on how to validate your security infrastructure during the development process through Continuous Security, and keep it that way through AWS Lambda auto-remediation. Verizon and Stelligent present a hands-on demo of these techniques, and a deep dive into the code that enables these technologies.
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
How can you ensure your environment is Secure? How can you implement an effective governance model in your organization? The AWS Cloud Adoption Framework (CAF) and its Security Perspective provide a structured approach to make risk based decisions, build security guardrails and meet your compliance goals as you migrate to AWS. The Security perspective of the CAF provides a set of 5 core themes designed to help you structure your selection and implementation of controls that are right for your business: IAM, Detective Controls, Infrastructure Security, Data Protection and Incident response. In this session you will learn what it takes to lead a Secure Cloud Journey for your organization and make key strategic decisions.
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
by Bill Reid, Sr Mgr, Solutions Architecture AWS
Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
by Cameron Worrell, Solutions Architect, AWS
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments.
by Cameron Worrell, Sr. Solutions Architect, AWS
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments.
Data protection is the highest priority for any organisation, so we answer common questions about GDPR, data residency, freedom of information, and privacy. We also address security-related compliance, risk management strategies, and best practices for securing data on AWS.
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
by Michael Wasielewski, CISSP, CCSP, AWS
The Security Perspective of the AWS Cloud Adoption Framework (CAF) provides a framework for maturation via a structured program that incorporates best practices and processes to define, build, and optimize how you operate security controls in the AWS platform. The Security perspective of the CAF provides a set of 5 core foundational theme designed to help you structure your selection and implementation of controls that are right for your business: IAM, Detective Controls, Infrastructure Security, Data Protection, and Incident response. During this session, we address how to put the Security Perspective of the CAF into practice.
In this webinar, you'll learn how to create security workspaces for multiple teams through your AWS account. Discover how IAM works and find out how it integrates with AWS services. In addition, learn how AWS Config rules and AWS Cloud Trial can help you identify and rectify misconfiguration issues quickly and effectively.
Similar to How to Achieve PCI DSS Compliance on AWS (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
16. Jeff Olen, Senior Product Manager, AlienVault
Kate MacLean, Senior Product Marketing Manager, Cisco
How to Implement Effective
Security Monitoring for AWS
Environments
Ryan Leatherbury, AlienVault Product Manager
18. Unified Security Management with Five Security Essentials
Vulnerability Assessment
Know where the vulnerabilities are to avoid easy
exploitation and compromise
Behavioral Monitoring
Identify suspicious behavior and potentially
compromised systems
Intrusion Detection
Know when suspicious activities happen in
your environment
SIEM Log Management
Correlate and analyze security event data from across
your network and respond
Asset Discovery
Know who and what is connected to your cloud or
on-premises environments at all times
Designed to natively monitor cloud
environments from a single cloud-
based pane of glass
19. Compliance Is Faster & Easier with USM
Anywhere
Streamline Compliance &
Security in One Solution
Continuous protection for your
cloud & on-premises environments
Asset Discovery
Vulnerability Assessment
Intrusion Detection
Incident Response
SIEM & Log Management
PCI, HIPAA & SOC 2 Certified
Automate Your Log
Collection & Analysis
• Collect, analyze, and report on
log data with up to 90 days of
online, searchable events.
• Be alerted to suspicious or
anomalous activities in your
environment.
• Store logs in our secure,
compliant log storage for 12 mos.
Accelerate & Maintain
Your Compliance
• Continuous security monitoring,
threat detection and automated
incident response
• Threat Intelligence from the
AlienVault Labs security
research team, delivered
automatically and continuously
updated.
20. Compliance Reporting out of the Box
Predefined, customizable reports for PCI DSS that map
directly to regulatory requirements,
• Event reports from your security tools such as firewalls,
and by key event types such as authentication
Customize alarm and event views, and save or
export them into new reports quickly, easily
Add visual elements for an executive-level summary
Integrity of raw log data is ensured with a “Write
Once, Ready Many (WORM)” method, and data is
timestamped as required by PCI DSS Section 10.4
22. AUTOMATED ASSET DISCOVERY
Manage security the way your infrastructure is managed
AWS INFRASTRUCTURE ASSESSMENT
Double check configuration and detect changes
LOG MANAGEMENT & CORRELATION
Monitor your applications & systems for compliance & security
CLOUDTRAIL MONITORING & ALERTING
Notification of environmental changes & abuse
AWS Integration
23. Customer Story: CeloPay
About CeloPay
• Jason Harper, CEO & Founder
• Founded in 2011, CeloPay provides a
solution for businesses to securely
collect credit card information from their
customers
• AlienVault customer for 2 years
24. Customer Story: CeloPay
Key challenges:
• Security monitoring - manual log reviews
were cumbersome and susceptible to error
• PCI DSS Compliance
• Strong desire to do everything possible to
protect customer data from threats, not just
“checking the boxes” for compliance
25. Customer Story: CeloPay
We chose AlienVault USM because:
• Comprehensive product: One product, easy to use,
no integrations to worry about
• Ease of deployment: Deployed with internal
resources, no expensive services needed, up and
running quickly (under 2 hours)
• Affordable: Price point accessible to a small business
• Low maintenance: Because it is a SaaS-based
product, no maintenance or upgrades to manage
26. Customer Story: CeloPay
Benefits gained using USM include:
• Centralized Log Management: Ability to pull in
Amazon CloudTrail, Amazon S3 and other AWS logs
into one place for reporting and alerting
• PCI DSS Compliance: Makes it really simple to prove
compliance. Can produce what the auditor needs in
seconds - very powerful
• Full security visibility and intelligent alerting: No
longer reliant on manual log reviews to spot threats