AWS Immersion Days featuring Trend Micro: Securing AWS Infrastructure with Trend Micro



Together, with AWS, Trend Micro has crafted 5 unique Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon.


3/10 - Creating an Extra Network Layer of Protection with Your AWS Services

3/17 - Amazon S3 Bucket Malware Scanning

4/14 - Building Modern Applications with Security Embedded

4/21 - Visibility into Open-Source Code

5/12 - Securing AWS Infrastructure with Trend Micro

5/19 - Amazon S3 Bucket Malware Scanning

 

Securing AWS Infrastructure with Trend Micro
Securing AWS Infrastructure with Trend Micro - Cloud One. Learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proactive, and accessible to developers, cloud architects, DevOps engineers this workshop is for you!

  • IDE Security Plugin
  • IaC Pipeline with Security
  • Integrating AWS with Cloud One
  • Automating AWS Well-Architected Framework
  • Finding and Remediating Misconfiguration

 

Visibility into Open-Source Code

Learn how to leverage Trend Micro Cloud One Open-Source Security by Snyk with your code repositories and CI/CD pipelines to scan projects. This empowers security teams with better visibility, tracking, and early awareness into open-source issues for more relevant insights and risk management.

  • Identify integration points, and connect to a GitHub sample repo to test for open source risks
  • Understand how to evaluate and monitor key findings and use the in-solution knowledge base
  • Gain an understanding of direct and indirect dependency mapping
  • Report and manage key findings for open source issues

 

Creating an Extra Network Layer of Protection with Your AWS Services
Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet connectivity to your AWS services and between VPCs. Learn how to protect your cloud network and meet compliance requirements.

  • Networking Security Architectures
  • Prerequisites
  • Deploying Network Security
  • Testing Security Features
  • CleanUp

 

Building Modern Applications with Security Embedded- DevSecOps

Learn how to leverage Trend Micro - Cloud One - Application Security with your serverless applications running on AWS Lambda or containerized applications running on AWS Fargate. If you are interested in making cloud security more efficient, proactive, and gain visibility to help lead your developers, cloud architects, and DevOps engineers, this workshop is for you!

  • Deploy Vulnerable Fargate Application and integrate Application Security
  • Deploy Vulnerable Lambda Application and integrate Application Security
  • Reporting


Amazon S3 Bucket Malware Scanning
Learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment.

  • Amazon S3 Security Best Practices
  • Amazon S3 bucket Malware Scanning with Trend Micro
  • Cloud One – File Storage Security - Introduction
  • Creating a Cloud One – File Security Storage account and get access to the event engine
  • Deploy File Storage Security on AWS account
  • Testing environment
  • Automation and Monitoring
  • Visibility with CloudWatch
  • Promote and Quarantine bucket Automation
  • Slack Integration

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Virtual


This event has no exhibitor/sponsor opportunities


When
Thu, May 12, 2022, 1:00pm - 5:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Trend Micro | Amazon Web Services (AWS)


Contact Event Organizer



Return to search results