Webinar: How to continuously monitor and assess your security posture in the AWS Cloud

Webinar: How to continuously monitor and assess your security posture in the AWS Cloud

Thursday September 17th   11 am PT |  2 pm ET

Join SANS and AWS Marketplace to learn how to create and implement an effective continuous monitoring and assessment strategy.

They will provide practical guidance that will help you secure your cloud control plane, identify misconfigurations, uncover security gaps, and enable you to better predict, prevent, and respond to events.

Register now.   HERE

 

« Cyber Security Startup Funding Surges In Britain
US - China Conflict Over Social Media »

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

Mission of the DHS is preventing terrorism and enhancing security; managing borders; administering immigration laws; securing cyberspace; and ensuring disaster resilience.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

WhiteCanyon Software

WhiteCanyon Software

WhiteCanyon Software, Inc. is a leading provider of security software employing permanent deletion technology to prevent identity theft.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

ECESM

ECESM

The ECESM project has been designed to enhance overall cyber security posture of Montenegro by accelerating the availability of educational and training resources.

Crucial Academy

Crucial Academy

Crucial Academy provides training courses to assist former military personnel in moving into a new career in cyber security in civilian life.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Aria Cybersecurity Solutions

Aria Cybersecurity Solutions

Aria Cybersecurity Solutions deliver solutions for enterprise-wide network security and data protection.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.