facebook pixel
@awseventschannel
Bad actors don’t break in; they log in. Today, 86% of data breaches involve stolen credentials. When attackers have legitimate credentials, posture management (DSPM / CSPM) isn’t enough. How do you stop a malicious insider or a bad actor with stolen credentials from exfiltrating AWS data? In this talk, learn how data-centric threat detection can stop breaches that bypass posture controls, including ransomware, phishing, and malicious insiders. Learn how Varonis safeguards against identity-based attacks, detects active attacks with user entity behavior analytics (UEBA), provides a full forensics log for investigations and compliance, and augments AWS GuardDuty with data-centric threat detection. This presentation is brought to you by Varonis, an AWS Partner. Learn more: AWS re:Inforce: go.aws/reinforce. More AWS events: go.aws/3kss9CP Subscribe: More AWS videos: bit.ly/2O3zS75 More AWS events videos: bit.ly/316g9t4 ABOUT AWS: Amazon Web Services (AWS) h...

 336

 5

 1

 336

Credits
    Tags, Events, and Projects
    • cloudsecurity
    • awsreinforce2025
    • aws
    • awsreinforce