+1 CPE

AWS Threat Playbook: Beyond Posture Management

June 25, 2025 11 a.m. ET | 4 p.m. BST Virtual Zoom Session Brian Vecci, Nolan Necoechea

88% of data breaches involve stolen credentials - traditional posture management tools like DSPM and CSPM can’t stop what looks like legitimate access.

So, how do you stop a malicious insider or an attacker with valid AWS credentials from exfiltrating your most sensitive data?

Join us as we expose the blind spots that posture tools leave behind. You’ll see how data-centric threat detection catches what DSPM and CSPM cannot, including ransomware, phishing, and insider threats hiding in plain sight.

Thank you for registering!
You’ll receive a confirmation email from Zoom shortly. Contact us if you do not receive it within 24 hours.

During this session, you’ll learn how to:

  • Map AWS identities to data sensitivity and activity 
  • Spot abnormal behavior with user entity behavior analytics (UEBA) 
  • Remove stale access and entitlements automatical
  • Strengthen GuardDuty with data-layer threat detection 
  • Streamline investigations with full forensic visibility 

Presenters:

Headshot_Remove stale access and entitlements automatical_Square_Webinars

Brian Vecci

Field CTO, Varonis

Nolan Necoechea

Nolan Necoechea

Director of Product Marketing, Varonis