Abstract

AWS is used extensively by Small/Medium/Large for easy deployment, management, scaling, monitoring, capacity provisioning, and load balancing. As a result, any business can then use its applications efficiently with minimal issues.

In this talk I will be explaining the right steps to device a successful Cyber Security Strategy, Framework, Models and Best Practices and Standards for businesses running on AWS.

I will be talking about how to follow the right course of action to Break the Intrusion Kill Chain in AWS in action.
->Detect
->Deny
->Disrupt
->Degrade
->Deceive
->Contain
->Respond
->Restore

Speaker

Vanshit Malhotra

Cyber Security Speaker | Consultant | Researcher | Trainer | Instructor | Mentor |

Timing

Starts at Saturday April 18 2020, 11:30 AM. The sessions runs for 30 minutes.

Resources