


AWS Reinvent 2022 – RECAP for Cloud Security Professionals!
Dec 14, 2022
•
AWS

AWS EKS EXPLAINED!
Dec 10, 2022
•
Amazon Web Services
.png)
BECOME A CLOUD SECURITY ARCHITECT IN 2023
Nov 13, 2022
•
Vectra

AWS Threat Detection for NOT SO COMMON AWS Services Explained
Nov 10, 2022
•
Clavis Security

RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS
Nov 6, 2022
•
VMWare

HOW TO BECOME A CLOUD NATIVE SECURITY ARCHITECT
Oct 30, 2022
•
Cloud Native Security Architect

Compliance as Code in Kubernetes
Oct 24, 2022
•
Nirmata

Software Signing for Kubernetes Supply Chain & Everybody Else
Oct 16, 2022
•
Red Hat
.png)
KUBERNETES BEST PRACTICES 2022
Oct 10, 2022
•
KSOC

Building Blocks of Cloud Security Program
Sep 29, 2022
•
Resourcely

Cloud Security Monitoring in Modern Security Security Stack
Sep 8, 2022
•
panther.com

API Security Best Practice 2022
Sep 5, 2022
•
Mossadams

Hacker Summer Camp 2022 : The Cloud Security Edition
Aug 28, 2022
•
Cloud Security

How to Threat Model the Digital Supply Chain in Cloud
Aug 21, 2022
•
Twilio

HOW TO SECURE Container environment FOR FINANCIAL SERVICES
Aug 7, 2022
•
Goldman Sachs

Fundamentals of AWS Cloud Security Assessment
Jul 30, 2022
•
Security Risk Advisors

HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
Jul 20, 2022
•
AllScripts
Zero Trust the Triple Paradox
Jul 9, 2022
•

Building & Scaling AWS Security Guardrails
Jul 4, 2022
•
Square
FIXING THAT BROKEN DIGITAL SUPPLY CHAIN
Jul 2, 2022
•
3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN
Jun 26, 2022
•
Digital Transformation – Are we there yet?
Jun 21, 2022
•

CISO Perspective: Sean Catlett, Slack CISO
Jun 15, 2022
•
Slack

CyberSecurity Asset Management for the Modern Security Stack
Jun 4, 2022
•
JupiterOne

Azure Security Fundamentals – Level 200
May 29, 2022
•
Purple

Confidential Computing in Azure Explained
May 28, 2022
•
Intel Corporation

Azure Cloud Security Architecture
May 25, 2022
•
AllScripts

Azure Security Fundamentals – Level 1
May 19, 2022
•
ExamPro

Finding Security Holes in Azure Services
May 15, 2022
•
Orca

Azure Kubernetes Service (AKS) Security Explained
May 7, 2022
•
KSOC

Azure Security Fundamentals – Zero Trust with Azure AD
May 1, 2022
•
Celidor

How to Secure Cloud Managed Kubernetes
Apr 26, 2022
•
LightSpin

Kubernetes Security Best Practices in 2022
Apr 25, 2022
•
Google Cloud

Manage Privileged Access for Kubernetes & Cloud
Apr 22, 2022
•
Teleport

How to become a Cloud Native Security Engineer
Apr 10, 2022
•
VMWare Tanzu

Service Mesh Security Explained!
Apr 3, 2022
•
Buoyant

Scaling a Practical AWS Asset Management Program
Mar 27, 2022
•
JupiterOne

Threat Hunting in AWS
Mar 20, 2022
•
Hunters

What is SBOM, iBOM?
Mar 13, 2022
•
Bridgecrew

Security for AI/ML Models in AWS
Mar 6, 2022
•
AWS

Building Google Cloud Security Products
Mar 3, 2022
•
Google Cloud

Google Cloud Security Fundamentals – Level 2
Feb 27, 2022
•
ITV

Google Cloud Security Fundamentals
Feb 20, 2022
•
Antoni Training

Red Team in Google Cloud
Feb 13, 2022
•
Red Team

How to Automate Security in Google Cloud?
Feb 6, 2022
•
Blocks

Authorization Control for Enterprise in Cloud
Jan 30, 2022
•
PlainID

AWS IAM Getting Started
Jan 23, 2022
•
AWS

Secret Management for Modern Apps Explained
Jan 16, 2022
•
TruffleSecurity

CISO in a Cloud World in 2022
Jan 12, 2022
•
Trustpilot

Building Modern Identity (IAM) Roadmap for Cloud
Jan 9, 2022
•
JumpCloud

Building Scalable Authorization in Cloud Native Apps
Jan 2, 2022
•
Permit.io