How to build a threat detection strategy in AWS

1 13 - How to build a threat detection strategy in AWS

One of the major concerns security teams have when their organization migrates business to a cloud environment is losing visibility into their systems and threat detection capabilities. Traditional network- and host-based monitoring can be adapted to support intrusion detection in the cloud. In this webcast, SANS Analyst David Szili focuses on the keys to detecting threats in the AWS environment and presents use cases to demonstrate best practices.

Attendees will learn:

  • How organizations can ensure intrusion detection and prevention and enhance visibility for threat detection in AWS using tools such as Amazon VPC Traffic Mirroring
  • What data sources are available for continuous monitoring
  • Which AWS-native tools are most useful for event management and analysis
  • How to automate monitoring processes
AWS Logo 300x188 - How to build a threat detection strategy in AWS

DOWNLOAD WHITEPAPER

By completing this form, I agree that I’d like to receive information from Amazon Web Services, Inc. and its affiliates (AWS) related to AWS services, events, and special offers, and my AWS needs. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the privacy policy of each entity (as published on its website) that you agree to be contacted by above

Explore our lead generation
marketing campaign services

Explore our lead generation
marketing campaign services