Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
REGISTER NOW
  1. Moscone South

Cloud attack vectors and security controls are different. Many companies breached on AWS moved sensitive data to AWS without following best practices or implementing cloud security controls correctly. Research indicates that devs are the new security target and attackers can use the same tools developers use on AWS. See Kolby Allen and Teri Radichel duke it out as Teri attacks an AWS account and Kolby defends it.

Learning Objectives:
1: Learn about the risks of improperly secured public cloud environments.
2: Observe real-world examples and tools on how to mitigated security risks.
3: Learn how to leverage automation to make it repeatable and secure.

Download pdf
Participants: