Master Agentic AI, GANs, Fine-Tuning & LLM Apps
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced data breach prevention strategies in AWS environments through this 17-minute conference talk from AWS re:Invent 2025. Learn why traditional posture management approaches like DSPM and CSPM fall short when attackers use legitimate stolen credentials, which account for 86% of data breaches today. Discover how data-centric threat detection can identify and stop sophisticated attacks including ransomware, phishing campaigns, and malicious insider threats that bypass conventional security controls. Examine Varonis's approach to safeguarding against identity-based attacks using user entity behavior analytics (UEBA) to detect active threats in real-time. Understand how to implement comprehensive forensics logging for security investigations and compliance requirements while augmenting AWS GuardDuty with specialized data-centric threat detection capabilities. Gain practical insights into protecting AWS data assets when traditional perimeter security measures prove insufficient against credential-based attacks.
Syllabus
AWS re:Invent 2025 - Beyond Posture Management: Stopping Data Breaches in AWS (SEC209)
Taught by
AWS Events