Build Modern Applications on AWS
Migrating public sector applications to AWS container services Container orchestration tools like Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS) are key to simplifying your deployment, management, and scaling of containerized applications. You’ll learn how to transform and modernize your organization through the adoption of Amazon EKS and Amazon ECS. We’ll explore technical implementation and au...
Digital Identity Protection Day
Don't miss this one-day event where industry analysts, customers, partners, and experts will explore identity-first security trends and zero-trust initiatives. Join our Digital Identity Protection Day to discover how to ensure and manage trusted identities for machines, workloads, applications, and cloud services to keep your organization secure.
Defending You Against the Unknown
AWS GameDay is a collaborative learning exercise that lets participants solve real-world problems in a gamified risk-free environment. In this cloud security GameDay participants will complete a series of tasks using Lacework to secure build environments, find known and unknown threats faster, and respond to anomalous activity. This is a completely hands-on opportunity for technical professionals to explore Lacework Polygraph Data Platform pro...
Brewing Up Better Cloud Security
Join Orca’s Sagy Kratu, Director of Enablement & Evangelism, and AWS’ Sr. Solutions Architect, Jason Patterson virtually as they discuss security capabilities that matter to you – all in under 45 minutes! Demonstrate your knowledge in a session and come away with 1CPE. Following the event, we will be sending out coffee gift cards to attendees who complete our post event survey.
Protect Sensitive Financial Data and Ac...
Financial services and technology organizations are the stewards of sensitive personal and financial data, and protecting that data is a common concern when it comes to cloud adoption. With the right combination of cloud provider and security, you can deliver financial services in the cloud that are secure and compliant without impacting performance or end-user experience.The Orca Cloud Security Platform delivers comprehensive coverage and vis...
Crafting the Cloud - Aligning Migration...
Learn why ‘lift and shift’ migration won’t deliver lasting change and what steps you can take to modernise your business from the ground up. In economic uncertain times, it's more important than ever to keep a lid on IT spend, stay ahead of disrupters and find new ways to innovate. But aligning your business with technology is hard if you don’t have the skills, culture or experience to get things done right or at scale....
Do You Know Who has the Keys to your Ca...
In this 5 part webinar series, we discuss how to best set up identify and access management, how to protect your AWS environment from network attacks, how to stay compliant, and more. Part 5: Do You Know Who has the Keys to your Castle? Learn About AWS Key Management System and Encryption. In this webinar, we’ll discuss: KMS CloudHSM Certificate Manager Secrets Manager Part 1: May 18 Part 2: May 25 Part 3: June 1 Part 4: June 8 Part 5: June 15
Don’t Be a Rule Breaker: Stay Compliant...
In this 5 part webinar series, we discuss how to best set up identify and access management, how to protect your AWS environment from network attacks, how to stay compliant, and more. Part 4: Don’t Be a Rule Breaker: Stay Compliant & Protect your Data with AWS. In this webinar, we’ll discuss: AWS Macie Inspector Config Part 1: May 18 Part 2: May 25 Part 3: June 1 Part 4: June 8 Part 5: June 15
Find Out if You Are Being Attacked Befo...
In this 5 part webinar series, we discuss how to best set up identify and access management, how to protect your AWS environment from network attacks, how to stay compliant, and more. Part 3: Find Out if You Are Being Attacked Before its Too Late. In this webinar, we’ll discuss: Security Hub GuardDuty Inspector CloudTrail CloudWatch Part 1: May 18 Part 2: May 25 Part 3: June 1 Part 4: June 8 Part 5: June 15
Creating an Extra Network Layer of Prot...
Thanks for stopping by! Together, with AWS, Trend has crafted 5 unique Security Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon. Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet co...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.