AWS Threat Playbook: Stopping Attacks That Bypass Posture Tools

88% of data breaches involve stolen credentials - traditional posture management tools like DSPM and CSPM can’t stop what looks like legitimate access.

 

So, how do you stop a malicious insider or an attacker with valid AWS credentials from exfiltrating your most sensitive data?

 

Join us as we expose the blind spots that posture tools leave behind. You’ll see how data-centric threat detection catches what DSPM and CSPM cannot, including ransomware, phishing, and insider threats hiding in plain sight.

Speaker Details

Brian Vecci, Field CTO, Varonis

 

Nolan Necoechea, Director of Product Marketing, Varonis

Event Topic

Big Data, Management, Technology

Relevant Audiences

All State and Local Government, All Federal Government

Other Agency

Other Federal Agencies
AWS Threat Playbook: Stopping Attacks That Bypass Posture Tools
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Mon, Aug 25, 2025 | 1:00 pm - 1:45 pm ET
Registration Cost
Complimentary
Website
Click here to view event website
Organizers
Cloud Security Alliance (CSA)