Users can access your cloud in many ways, so what’s the best way to protect it? Building a zero trust architecture for your AWS Cloud requires a multi-layered set of controls and services. While the topic of zero trust has received a lot of attention lately, what does it really mean — especially for cloud access?
In this on-demand webinar you’ll hear why zero trust is one of the proven approaches for cloud access management. Discover all the elements of zero trust controls and technology and how to combine them into a best practice architecture that works best for building and protecting your cloud.
You will learn:
- How to build a sustainable, layered zero trust model for your cloud
- The role of network access controls (NACs) and how to deploy identity controls in cloud zero trust
- Finding tools, services, and partners in AWS Marketplace to help you build a zero trust architecture
Who should attend?
Security analysts, security architects, security engineers, cloud security architects, and the office of the CISO (chief information security officer)
Dave Shackleford, Analyst and Senior Instructor at SANS
Dave Shackleford, a SANS analyst, senior instructor, course author, GIAC technical director, and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as a chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.
Subbu Somasundaram, Senior Category Lead, AWS
Subbu is a Senior Category Lead for AWS Marketplace and previously was a Security Architect in the AWS Professional Services organization. Subbu has 15+ years of subject matter expertise in helping large enterprise customers with security transformation, DevSecOps, security architecture, and implementations. His security expertise includes Cloud, Enterprise, Application, Mobile, Payment cards, Protocol research, Reverse engineering, and NFC/RFID.