ARCHITECTING HIGHLY SECURE APPLICATIONS ON AWS PRESENTED BY TREND MICRO€¦ ·  ·...

2
Page 1 of 2 SECURITY LAB FOR AWS Visit the Security Lab presented by Trend Micro between 10am and 5pm to recharge and complete your knowledge on multi-layered security in AWS. These free training labs give you an overview with the AWS Management Console in a variety of common security operation use cases The Security Labs take 45 minutes each with 15 minutes Q&A at the end. You may choose up to 4 different Security Scenario Sessions. Please select the session(s) of your choice. You will have to register for each session individually: 10.00 – 10.45 : Incident Response 11.30 – 12.15 : Data Encryption & Key Management 14.00 – 14.45 : Web Application Vulnerability Scanning 15.30 – 16.15 : Intrusion Prevention The sessions are “big picture” sessions where a Security Expert from Trend Micro will lead you through a Live Demo within the AWS environment. Prerequisites: Basic knowledge of both IT security and core AWS services, including EC2, and EBS. ARCHITECTING HIGHLY SECURE APPLICATIONS ON AWS PRESENTED BY TREND MICRO Incident Response 10.00 – 10.45 Intrusion Prevention 15.30 – 16.15 Data Encryption & Key Management 11.30 – 12.15 Web Application Vulnerability Scanning 14.00 – 14.45 free registration: trendmicro.de/events Security Lab for AWS

Transcript of ARCHITECTING HIGHLY SECURE APPLICATIONS ON AWS PRESENTED BY TREND MICRO€¦ ·  ·...

Page 1 of 2 • SECURITY LAB FOR AWS

Visit the Security Lab presented by Trend Micro between 10am and 5pm to recharge and complete your knowledge on multi-layered security in AWS. These free training labs give you an overview with the AWS Management Console in a variety of common security operation use cases The Security Labs take 45 minutes each with 15 minutes Q&A at the end.

You may choose up to 4 different Security Scenario Sessions. Please select the session(s) of your choice. You will have to register for each session individually:

• 10.00 – 10.45 : Incident Response• 11.30 – 12.15 : Data Encryption & Key Management• 14.00 – 14.45 : Web Application Vulnerability Scanning• 15.30 – 16.15 : Intrusion Prevention

The sessions are “big picture” sessions where a Security Expert from Trend Micro will lead you through a Live Demo within the AWS environment.

Prerequisites: Basic knowledge of both IT security and core AWS services, including EC2, and EBS.

ARCHITECTING HIGHLY SECURE APPLICATIONS ON AWS PRESENTED BY TREND MICRO

Incident Response

10.00 – 10.45

Intrusion Prevention

15.30 – 16.15

Data Encryption & Key Management

11.30 – 12.15

Web Application Vulnerability Scanning

14.00 – 14.45

free registration:

trendmicro.de/events

Security Lab for AWS

Page 2 of 2 • SECURITY LAB FOR AWS

COURSE DESCRIPTIONS:

10.00 – 10.45 h - Incident ResponseIn the event of security incidents, it is possible to automatically isolate compromised machines from the internet, and recreate them within a short time by using Amazon Web Services Auto Scaling. In this session, you will learn how to implement and manage automatic incident and response procedures, to minimize the risk of damage and optimize the analysis of incidents.

11.30 – 12.15 h – Data Encryption & Key ManagementWhen talking about cloud offerings, one cannot avoid talking about encryption. In this session we will share experience about encryption best practices and how to achieve a data-at-rest encryption in AWS’ EC2 services.

14.00 – 14.45 h - Web Application Vulnerability ScanningIf you are providing web-shops or other online services to your customers, you are already in a combat with cyber threats like XSS, Injection Attacks, CSRF or just logical errors within your service.Your web application is vulnerable. Learn how to deal with the risk and defend the application and platform against most common attacks.

15.30 – 16.15 h – Intrusion PreventionAll software is vulnerable. This is due to the fact, that it is written by humans. Being sensible about this, is the fi rst step to improve the security in IT environments. In this session we will show you how to easily facilitate the power of a host-based Intrusion Detection / Prevention system (IDS / IPS), how to keep the administrative overhead low and still increase security.

FREE REGISTRATION – RESERVE YOUR SEAT NOW:http://www.trendmicro.de/newsroom/events/100565/

Please note, that there is limited space in each session and your attendance may therefore only be confi rmed on a fi rst-come-fi rst-served basis.

ABOUT TREND MICRO & AWS:www.trendmicro.com/aws

CONTACT TREND MICRO:[email protected]

©2015 Trend Micro Deutschland GmbH, Zeppelinstrasse 1, 85399 Hallbergmoos. Alle Rechte vorbehalten. Trend Micro und dasT-Ball-Logo sind Marken oder eingetragene Marken von Trend Micro Inc.

Securing Your Journey to the Cloud