6 webcasts found
+ 90 past events found
Back to Search Begin New Search Save Search Auto-Notify
Cloud Security Strategies: Explore the...
Organisations can be compromised and experience data breaches due to an ineffective cybersecurity strategy. In this session, Tim Rains, Amazon Web Services (AWS) EMEA Regional Leader for Security & Compliance, will inspect popular enterprise cybersecurity strategies and explain why sometimes they fail to protect. Learn how to measure the effectiveness of any cybersecurity strategy, how this should influence your IT roadmap, and how the clo...
Add Favorite
Security & Compliance Basics: Learn the...
Think differently about data security in the cloud – it’s not the same as you’ll find on-premises. This session will walk you through the building blocks of a cloud security model and explain the key security features of Amazon Web Services (AWS). Data protection is the highest priority for any organisation, so we’ll be answering common questions about GDPR, data residency, freedom of information, and privacy. We...
Add Favorite
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Working with Open Data on AWS
Come learn how governments, research institutions, and private companies are using AWS to share massive amounts of data publicly. Join this webinar to discover best practices for sharing data in the cloud, how to find publicly available datasets through the Registry of Open Data on AWS, and how you can share your own data through AWS
Add Favorite
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
Add Favorite
Delivering Secure, Lifesaving Healthcar...
The benefits of cloud technology are altering how essential operations are conducted for government organizations. From remote work to remote healthcare, the ability to perform necessary tasks from anywhere in the world is changing the game. Networks like the National Emergency Tele-Critical Care Network (NETCCN) are set up to do just that: change the game. This technology delivers lifesaving telehealth critical care in austere environments, w...
Add Favorite
Back to Search Begin New Search