On-Demand: Secure, PROTECTED & Compliant Data


A/NZ Public Sector Government Webinar Series

Title & Headline


Watch our on-demand webinar series and discover how government organisations have automated their security controls to govern data compliance across multiple accounts with Amazon Web Services (AWS).

Join our AWS expert Rafaela Brownlie, Solutions Architect, AWS, as she walks you through Australian government requirements on managing data and how AWS features and services can automate data compliance at scale through best practice scenarios.

Or join James Kingsmill, Solutions Architect, AWS, as he demonstrates how to deploy sensitive workloads onto AWS using our newly developed IRAP PROTECTED quick-start guide.

Topic #1
Compliance as Code: Automating Australian Government Data Compliance on AWS (Level 200)

Speaker: Rafaela Brownlie, Solutions Architect, AWS

In this session, dive into Australian government requirements on managing data and how AWS features and services can automate data compliance at scale. Explore how to automate the security controls to govern and monitor data compliance using Amazon Simple Storage Service (Amazon S3), AWS Organisations, AWS Config, and AWS Systems Manager across multiple accounts.

Learning objectives:

  • Government data classifications and security controls required to maintain compliance
  • Report on compliance with AWS Config
  • Protect data integrity with Amazon S3 lifecycles
  • Automate security controls with AWS Organisations

Topic #2
Managing Secure Data Solutions Using IRAP PROTECTED Quick Start Guide (Level 300)

Speaker: James Kingsmill, Solutions Architect, AWS

Customers are increasingly looking to deploy sensitive workloads in AWS following the recent PROTECTED certification and expanded offering of 60+ PROTECTED cloud services. The Information Security Registered Assessors Program (IRAP) PROTECTED Quick Start guide allows users to create cloud-based architecture and workloads that meets Australian Cyber Security Centre (ACSC) Information Security Manual (ISM) requirements. Hear an overview of the secured reference architecture and guidance on system deployment and PROTECTED data storage.

Learning objectives:

  • Understand security mitigation process included in the IRAP PROTECTED reference architecture
  • Learn how to deploy the IRAP PROTECTED Quick Start and store PROTECTED data using the system




ON-DEMAND: REGISTER NOW