AWS Reinvent 2022 – RECAP for Cloud Security Professionals!
Dec 14, 2022
•
AWS
AWS EKS EXPLAINED!
Dec 10, 2022
•
Amazon Web Services
BECOME A CLOUD SECURITY ARCHITECT IN 2023
Nov 13, 2022
•
Vectra
AWS Threat Detection for NOT SO COMMON AWS Services Explained
Nov 10, 2022
•
Clavis Security
RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS
Nov 6, 2022
•
VMWare
HOW TO BECOME A CLOUD NATIVE SECURITY ARCHITECT
Oct 30, 2022
•
Cloud Native Security Architect
Compliance as Code in Kubernetes
Oct 24, 2022
•
Nirmata
Software Signing for Kubernetes Supply Chain & Everybody Else
Oct 16, 2022
•
Red Hat
KUBERNETES BEST PRACTICES 2022
Oct 10, 2022
•
KSOC
Building Blocks of Cloud Security Program
Sep 29, 2022
•
Resourcely
Cloud Security Monitoring in Modern Security Security Stack
Sep 8, 2022
•
panther.com
API Security Best Practice 2022
Sep 5, 2022
•
Mossadams
Hacker Summer Camp 2022 : The Cloud Security Edition
Aug 28, 2022
•
Cloud Security
How to Threat Model the Digital Supply Chain in Cloud
Aug 21, 2022
•
Twilio
HOW TO SECURE Container environment FOR FINANCIAL SERVICES
Aug 7, 2022
•
Goldman Sachs
Fundamentals of AWS Cloud Security Assessment
Jul 30, 2022
•
Security Risk Advisors
HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
Jul 20, 2022
•
AllScripts
Zero Trust the Triple Paradox
Jul 9, 2022
•
Building & Scaling AWS Security Guardrails
Jul 4, 2022
•
Square
FIXING THAT BROKEN DIGITAL SUPPLY CHAIN
Jul 2, 2022
•
3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN
Jun 26, 2022
•
Digital Transformation – Are we there yet?
Jun 21, 2022
•
CISO Perspective: Sean Catlett, Slack CISO
Jun 15, 2022
•
Slack
CyberSecurity Asset Management for the Modern Security Stack
Jun 4, 2022
•
JupiterOne
Azure Security Fundamentals – Level 200
May 29, 2022
•
Purple
Confidential Computing in Azure Explained
May 28, 2022
•
Intel Corporation
Azure Cloud Security Architecture
May 25, 2022
•
AllScripts
Azure Security Fundamentals – Level 1
May 19, 2022
•
ExamPro
Finding Security Holes in Azure Services
May 15, 2022
•
Orca
Azure Kubernetes Service (AKS) Security Explained
May 7, 2022
•
KSOC
Azure Security Fundamentals – Zero Trust with Azure AD
May 1, 2022
•
Celidor
How to Secure Cloud Managed Kubernetes
Apr 26, 2022
•
LightSpin
Kubernetes Security Best Practices in 2022
Apr 25, 2022
•
Google Cloud
Manage Privileged Access for Kubernetes & Cloud
Apr 22, 2022
•
Teleport
How to become a Cloud Native Security Engineer
Apr 10, 2022
•
VMWare Tanzu
Service Mesh Security Explained!
Apr 3, 2022
•
Buoyant
Scaling a Practical AWS Asset Management Program
Mar 27, 2022
•
JupiterOne
Threat Hunting in AWS
Mar 20, 2022
•
Hunters
What is SBOM, iBOM?
Mar 13, 2022
•
Bridgecrew
Security for AI/ML Models in AWS
Mar 6, 2022
•
AWS
Building Google Cloud Security Products
Mar 3, 2022
•
Google Cloud
Google Cloud Security Fundamentals – Level 2
Feb 27, 2022
•
ITV
Google Cloud Security Fundamentals
Feb 20, 2022
•
Antoni Training
Red Team in Google Cloud
Feb 13, 2022
•
Red Team
How to Automate Security in Google Cloud?
Feb 6, 2022
•
Blocks
Authorization Control for Enterprise in Cloud
Jan 30, 2022
•
PlainID
AWS IAM Getting Started
Jan 23, 2022
•
AWS
Secret Management for Modern Apps Explained
Jan 16, 2022
•
TruffleSecurity
CISO in a Cloud World in 2022
Jan 12, 2022
•
Trustpilot
Building Modern Identity (IAM) Roadmap for Cloud
Jan 9, 2022
•
JumpCloud
Building Scalable Authorization in Cloud Native Apps
Jan 2, 2022
•
Permit.io