Storm Clouds AheadAchieving good third-party risk outcomes requires that your vendors operate secure cloud environments. Many security teams have assumed that if a third-party is using Amazon Web Services that they are operating securely, when in fact, the sheer breadth of an AWS deployment leaves plenty of room for error. 

Join us for a live webinar on August 18th at 1:00pm EST, as experts from Stratum Security and RiskRecon will take you through the expanse of a proper AWS deployment, diving into real-world examples of what can go right - and wrong - when securing AWS operations. We will discuss the core security criteria that every practitioner should be familiar with to properly assess the operations of any third-party AWS environment and will provide you will the knowledge you need to begin securing your cloud environments today. 

Join this session to learn about:
- Real-world use cases where AWS environments were exploited due to missteps in configuration
- Core security criteria necessary for assessing the security of an AWS environment
- A new playbook and questionnaire that will provide you with a step-by-step guide to secure AWS operations

Register Now