Bad actors don’t break in; they log in. Today, 86% of data breaches involve stolen credentials. When attackers have legitimate credentials, posture management (DSPM / CSPM) isn’t enough. How do you stop a malicious insider or a bad actor with stolen credentials from exfiltrating AWS data? In this talk, learn how data-centric threat detection can stop breaches that bypass posture controls, including ransomware, phishing, and malicious insiders. Learn how Varonis safeguards against identity-based attacks, detects active attacks with user entity behavior analytics (UEBA), provides a full forensics log for investigations and compliance, and augments AWS GuardDuty with data-centric threat detection. This presentation is brought to you by Varonis, an AWS Partner.
Learn more:
AWS re:Inforce:
go.aws/reinforce.
More AWS events:
go.aws/3kss9CP
Subscribe:
More AWS videos:
bit.ly/2O3zS75
More AWS events videos:
bit.ly/316g9t4
ABOUT AWS:
Amazon Web Services (AWS) h...