top of page

Securing Your Cloud Environment:
Best Practices and Tools for AWS Users

17th August 2023  - 12pm - 5pm (GMT +8)

 Langkawi Room, Level 35, Amazon Web Services Malaysia,
The Gardens North Tower, Lingkaran Syed Putra, Mid Valley City,
59200 Kuala Lumpur, Federal Territory of Kuala Lumpur

Join us for the upcoming Cloud Security Immersion Days, co-hosted by Trend Micro and AWS!
This program is for individuals and engineering teams who want to learn more about the security aspects of

moving to AWS, and for teams of architects who want to understand cloud security concepts.

White Podium

Presented By

toh _edited.jpg

Toh Zhen Yang

Chief Operating Officer

G-AsiaPacific

WhatsApp Image 2023-05-23 at 12.24.02 PM.jpeg
Jack XU.png
bon new.png

Cheong Hoon Sin

Security Solutions Architect

Jack Xu

Solution Architect
SEA Cloud

Bon Yeung

Cloud Security Expert

Amazon Web Services

Trend Micro

Trend Micro

Business Meeting

Hands-on Labs

This session will provide an overview of common security challenges faced by AWS users, including misconfigurations, attack vectors, and lack of threat visibility. We will discuss best practices for choosing the right security solutions and provide a deep dive into two tools that can help secure your AWS environment. The session will conclude with a hands-on lab and quiz to reinforce key concepts.
 

* Please bring along your own device/laptop to participate for the Hands-on Labs session!
 

White Shapes

Agenda of the Day

What to expect:

Introduction: Brief overview of AWS security challenges
 

  1. Misconfigurations: Understanding how they happen and their potential impact on your AWS environment

  2. Attack Vectors: Identifying weaknesses that hackers can exploit and best practices for mitigating risks

  3. Lack of Threat Visibility: Addressing the difficulty of monitoring cloud workloads and tools that can help provide real-time visibility

Cloud Attack Surface Risk Management:

  1. Discover, Assess & Mitigate Security Risk through a single platform

  2. Cloud Security Posture Management: Assess your current environment to identify, monitor and remediate misconfigurations and compliance gaps

  3. Workload Security Protection: Secure data on your cloud workloads

Delicate Fabric

Sign Up
Today!

We would like to invite you to our prestigious, complimentary, in-person hands-on lab, exclusively curated to offer invaluable insights to enhance

your practical experiences.
 

Kindly complete the provided form to confirm your attendance and secure your seat at this highly anticipated event!

Company logo (square) white.png

Follow Us On:

  • Facebook
  • LinkedIn
  • Youtube
  • Website
  • Instagram

G-AsiaPacific Sdn Bhd, Block I-7-5, SetiaWalk, Persiaran Wawasan,
Pusat Bandar Puchong, 47160 Puchong, Selangor, Malaysia.

bottom of page