Amazon AWS around the Hash Table.
Amazon AWS adoption with cybersecurity first principle strategies.
In this second session reviewing cloud platforms through the lens of first principle thinking, Rick and the Hash Table review Amazon Web Services (AWS). They discuss how AWS supports, or doesn’t support, strategies of resilience, zero trust, intrusion kill chains, and risk assessments. The Hash Table gives their detailed technical experiences and strategies using AWS to support cybersecurity.
Jerry Archer, Merritt Baer, and Mark Ryland join Rick around the Hash Table.
Cybersecurity professional development and continued education.
You will learn about: AWS networking and API techniques, DevSecOps in a cloud environment, AWS services and security tools, AWS strategies that support cybersecurity first principles.
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more Amazon AWS and cybersecurity first principles resources, check the topic essay.