Get a prioritized list of the riskiest configurations to address.
How to automate the remediation of checks that drift out of a secure state.
Understand the different ways that data can be made public or private in AWS.
An attendee will learn:
Understand the Center for Internet Security’s Foundations benchmarks, and their implications for securely configuring accounts with each of the major cloud providers
Virtual Currency Providers
Chief Compliance Officers
General Counsel and Legal Staffs
Chief Risk Officers
Chief Operating Officers
Technical Product Manager