AWS Immersion Days featuring Trend Micro

Various Dates | 9:00 a.m. - 1:00 p.m. | 1:00 p.m. - 5:00 p.m. ET

Various Dates  |  9:00 a.m. - 1:00 p.m. | 1:00 p.m. - 5:00 p.m. ET


“”

AWS and Trend Micro Security Immersion Days were well organized and provided insightful technical details about how tools actually function versus just the end result of alerts in the console. These events are a great opportunity to deploy and test cloud security tools with AWS environment in a controlled space.

— Josh Taylor, Senior Security Engineer, Global Fortune 100 Company

Thanks for stopping by! Together, with AWS, Trend Micro has crafted 4 unique Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon.

Securing AWS Infrastructure with Trend Micro

Securing AWS Infrastructure with Trend Micro - Cloud One. Learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proactive, and accessible to developers, cloud architects, DevOps engineers this workshop is for you!

  • • IDE Security Plugin
  • • IaC Pipeline with Security
  • • Integrating AWS with Cloud One
  • • Automating AWS Well-Architected Framework
  • • Finding and Remediating Misconfiguration

Creating an Extra Network Layer of Protection with Your AWS Services

Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet connectivity to your AWS services and between VPCs. Learn how to protect your cloud network and meet compliance requirements.

  • • Networking Security Architectures
  • • Prerequisites
  • • Deploying Network Security
  • • Testing Security Features
  • • Clean Up

Amazon S3 Bucket Malware Scanning

Learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment.

  • • Amazon S3 Security Best Practices
  • • Amazon S3 bucket Malware Scanning with Trend Micro
  • • Introduction, creating and deploying a Cloud One – File Security Storage account and access to the event engine
  • • Testing environment
  • • Automation and monitoring
  • • Visibility with CloudWatch
  • • Promote and quarantine bucket automation
  • • Slack Integration

Streamline Security Operations and Management 

In this workshop, you’ll learn how to leverage Cloud One - Workload Security to enforce the detection and protection policy (application control, anti-malware, IPS, firewall, integrity monitoring, and log inspection) via a small software component deployed on the server or instances being protected Learn how to automate security deployment and protect workloads no matter their location.

  • Workload Security Protection
  • Prerequisites
  • Deploying Workload Security
  • Testing Security Features
  • Clean Up

“”

AWS and Trend Micro Security Immersion Days were well organized and provided insightful technical details about how tools actually function versus just the end result of alerts in the console. These events are a great opportunity to deploy and test cloud security tools with AWS environment in a controlled space.

— Josh Taylor, Senior Security Engineer, Global Fortune 100 Company

Thanks for stopping by! Together, with AWS, Trend Micro has crafted 4 unique Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon.

Securing AWS Infrastructure with Trend Micro

Securing AWS Infrastructure with Trend Micro - Cloud One. Learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proactive, and accessible to developers, cloud architects, DevOps engineers this workshop is for you!

  • • IDE Security Plugin
  • • IaC Pipeline with Security
  • • Integrating AWS with Cloud One
  • • Automating AWS Well-Architected Framework
  • • Finding and Remediating Misconfiguration

Creating an Extra Network Layer of Protection with Your AWS Services

Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet connectivity to your AWS services and between VPCs. Learn how to protect your cloud network and meet compliance requirements.

  • • Networking Security Architectures
  • • Prerequisites
  • • Deploying Network Security
  • • Testing Security Features
  • • Clean Up

Amazon S3 Bucket Malware Scanning

Learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment.

  • • Amazon S3 Security Best Practices
  • • Amazon S3 bucket Malware Scanning with Trend Micro
  • • Introduction, creating and deploying a Cloud One – File Security Storage account and access to the event engine
  • • Testing environment
  • • Automation and monitoring
  • • Visibility with CloudWatch
  • • Promote and quarantine bucket automation
  • • Slack Integration

Streamline Security Operations and Management 

In this workshop, you’ll learn how to leverage Cloud One - Workload Security to enforce the detection and protection policy (application control, anti-malware, IPS, firewall, integrity monitoring, and log inspection) via a small software component deployed on the server or instances being protected Learn how to automate security deployment and protect workloads no matter their location.

  • Workload Security Protection
  • Prerequisites
  • Deploying Workload Security
  • Testing Security Features
  • Clean Up

Trend Micro guards your privacy: Read our privacy policy.

You may unsubscribe from sender emails at any time by following the instructions in the communications received. AWS handles your information as described in the AWS Privacy Notice. Providing the AWS Partner with your information may involve transferring it to another country. For questions about how the AWS Partner will handle your information, please contact the AWS Partner directly or refer to its privacy policy.