A Holistic Approach to Cloud Security

Details
Behind the Scenes with Jobvite.
You’ve configured host and network based ACLs, enabled CloudTrail logging, encrypted all data at rest (EBS & S3), secured your AMIs, regularly patch EC2 instances, and locked down IAM roles. But are you secure? How do you know if/when a security incident has occurred, detect unauthorized access to data, identify vulnerabilities in your application, block online attacks in real-time, or certify your application as truly secure?
Theodore Kim, VP of Technical Operations at Jobvite, and his team will present a holistic approach to securing your application environment hosted in AWS. Topics will include:
-
Do I need an Intrusion Detection/Prevention (IDS/IPS) System?
-
How to detect and block network/application intrusion attempts in real time.
-
Log file parsing/alerting via Security Information & Event Management (SIEM) systems to identify anomalous system activity.
-
An overview of penetration/vulnerability testing services.
-
Auditing your environment to identify security vulnerabilities and support compliance efforts.
-
How to incorporate security vulnerability scanning into the build and release process.
Light refreshments will be served.
Register here at the AWS SF Loft Website » (https://www.thinkreg.com/coral/viewWebsite.do?pageId=8a94a8b447fa4f710147ff5b0a17069e)

A Holistic Approach to Cloud Security