+1 CPE

AWS Threat Playbook

Stopping attacks that bypass posture tools

June 25, 2025 11 a.m. ET | 4 p.m. BST Virtual Zoom Session Brian Vecci, Nolan Necoechea

88% of data breaches involve stolen credentials - traditional posture management tools like DSPM and CSPM can’t stop what looks like legitimate access.

So, how do you stop a malicious insider or an attacker with valid AWS credentials from exfiltrating your most sensitive data?

Join us as we expose the blind spots that posture tools leave behind. You’ll see how data-centric threat detection catches what DSPM and CSPM cannot, including ransomware, phishing, and insider threats hiding in plain sight.

Registration closed.

Unfortunately, registration has closed at this time. Don't worry, if you missed it, you can still watch the session on-demand! 

During the session, we'll dive into:

  • The anatomy of an AWS data breach
  • The gaps left by posture management solutions
  • The tools (or capabilities) that are essential to stopping breaches in AWS

Presenters:

Headshot_Remove stale access and entitlements automatical_Square_Webinars

Brian Vecci

Field CTO, Varonis

Nolan Necoechea

Nolan Necoechea

Director of Product Marketing, Varonis