Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Beyond Posture Management - Stopping Data Breaches in AWS

AWS Events via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to protect AWS environments from data breaches that bypass traditional posture management controls in this conference talk from AWS re:Inforce 2025. Discover why 86% of data breaches involve stolen credentials and understand the limitations of Data Security Posture Management (DSPM) and Cloud Security Posture Management (CSPM) when attackers use legitimate credentials. Explore data-centric threat detection strategies to combat ransomware, phishing attacks, and malicious insiders who have gained authorized access to your systems. Master techniques for safeguarding against identity-based attacks using user entity behavior analytics (UEBA) to detect anomalous activities and active threats. Understand how to maintain comprehensive forensics logs for security investigations and compliance requirements. Learn how data-centric threat detection can augment AWS GuardDuty to provide enhanced security coverage beyond traditional cloud security tools. Gain insights into protecting your AWS data assets when traditional perimeter security fails and attackers operate with valid credentials.

Syllabus

AWS re:Inforce 2025 - Beyond posture management: Stopping data breaches in AWS (DAP221)

Taught by

AWS Events

Reviews

Start your review of Beyond Posture Management - Stopping Data Breaches in AWS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.