session Replay

AWS Threat Playbook: Stopping attacks that bypass posture tools

Watch as we expose the blind spots that posture tools leave behind. You’ll see how data-centric threat detection catches what DSPM and CSPM cannot, including ransomware, phishing, and insider threats hiding in plain sight.

In this session, you'll learn:

  • The anatomy of an AWS data breach
  • The gaps left by posture management solutions
  • The tools (or capabilities) that are essential to stopping breaches in AWS

Presenters:

Headshot_BrianVecci_Square_Webinars

Brian Vecci

Field CTO, Varonis

Nolan Necoechea

Nolan Necoechea

Director of Product Marketing, Varonis

In this session, you'll learn:

  • The challenges with legacy DLP solutions
  • The threat actor’s advantage and common attack strategies for exfiltrating sensitive data
  • Actionable tips to improve your data security posture
  • Best practices to prevent data loss in the cloud and on-prem
  • Outcomes you can expect from adopting a next-gen DLP strategy
March 26 2025 - DFF - presenters