Trend Micro Immersion Days featuring Amazon Web Services (AWS)

Various Dates | 1:00 p.m. - 5:00 p.m. ET

AWS partner badge
“”

AWS and Trend Micro Security Immersion Days were well organized and provided insightful technical details about how tools actually function versus just the end result of alerts in the console. These events are a great opportunity to deploy and test cloud security tools with AWS environment in a controlled space.



Josh Taylor, Senior Security Engineer, Global Fortune 100 Company

Thanks for stopping by! Together, with AWS, Trend has crafted 5 unique Security Immersion Days to address your organization’s cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! Earn your Immersion Day Verified badge upon completion of a workshop. See you soon.

 
Learn More →
Securing AWS Infrastructure

Learn more

Creating an Extra Network Layer of Protection with Your AWS Services

Learn more

Amazon S3 Bucket Malware Scanning

Learn more

Streamline Security Operations and Management

Learn more

Securing your Data Migration to AWS S3

Learn more

Registration for these events is now closed.

Trend Micro guards your privacy: Read our privacy policy.

Securing AWS Infrastructure

 

Learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proactive, and accessible to developers, cloud architects, DevOps engineers this workshop is for you!

    • IDE Security Plugin
    • IaC Pipeline with Security
    • Integrating AWS with Cloud One
    • Automating AWS Well-Architected Framework
    • Finding and Remediating Misconfiguration
    • Cleanup

Section 2 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Creating an Extra Network Layer of Protection with Your AWS Services

Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet connectivity to your AWS services and between VPCs. Learn how to protect your cloud network and meet compliance requirements.

    • Introduction
    • Networking Security Architectures
    • Prerequisites
    • Deploying Network Security
    • Testing Security Features
    • Cleanup
 

Section 3 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 3 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Amazon S3 Bucket Malware Scanning

 

Learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment.

    • Introduction
    • Prerequisites
    • Deploy Cloud One - File Storage Security
    • Automation and Notification
    • Cleanup
    • Conclusion

Section 4 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Streamline Security Operations and Management

Learn how to leverage a workload security platform to enforce the detection and protection policy (application control, anti-malware, IPS, firewall, integrity monitoring, and log inspection) via a small software component deployed on the servers, VMs or instances being protected.

    • Components and Protection
    • Prerequisites
    • Deploying Workload Security
    • AWS Security Hub integration
    • Testing Security Features
    • Cleanup
 

Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Securing your Data Migration to AWS S3

 

In this session, we will look at a design pattern that can be used to simplify your data ingest and migration journey into AWS. Participants will get hands-on experience in deploying, configuring, and transferring data using one of the available AWS migration services like AWS DataSync.

    • Introduction
    • Prerequisites
    • Deploying Environment
    • Integrating File Storage Security
    • Migrate Objects to S3
    • Access S3 Objects with Storage Gateway

Section 6 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Get the best Security Immersion Day experience.

Schedule a 30-minute Immersion Day prep call to get the most out of these workshops!

Section 7 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 7 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 7 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.