Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to protect AWS environments from data breaches that bypass traditional posture management controls in this conference talk from AWS re:Inforce 2025. Discover why 86% of data breaches involve stolen credentials and understand the limitations of Data Security Posture Management (DSPM) and Cloud Security Posture Management (CSPM) when attackers use legitimate credentials. Explore data-centric threat detection strategies to combat ransomware, phishing attacks, and malicious insiders who have gained authorized access to your systems. Master techniques for safeguarding against identity-based attacks using user entity behavior analytics (UEBA) to detect anomalous activities and active threats. Understand how to maintain comprehensive forensics logs for security investigations and compliance requirements. Learn how data-centric threat detection can augment AWS GuardDuty to provide enhanced security coverage beyond traditional cloud security tools. Gain insights into protecting your AWS data assets when traditional perimeter security fails and attackers operate with valid credentials.
Syllabus
AWS re:Inforce 2025 - Beyond posture management: Stopping data breaches in AWS (DAP221)
Taught by
AWS Events