Monday, June 24 | Boston | Seaport World Trade CenterRegister Now
No matter where you are in your cloud journey, you have a place here. Join us in Boston the day before AWS re:Inforce to talk about assessing, monitoring, and operationalizing security for your cloud and hybrid environments.
Use this template to communicate the value of attending.
Corey Thomas, Chairman & Chief Executive Officer, Rapid7
Nearly all organizations are undergoing a cloud transformation- but are today’s security programs equipped to adequately address the evolving cloud landscape? Rapid7’s CEO Corey Thomas will address the impact cloud transformation has on customers now, the trends that will impact organizations in the future and Rapid7’s cloud strategy to support you throughout your journey.
Lee Weiner, Chief Product Officer, Rapid7
Cloud transformation impacts nearly all areas of business operations and has changed everything from how employees operate to how businesses deliver products and services. Rapid7’s Chief Product Officer Lee Weiner will explore how you can migrate to the cloud in a secure manner.
How are your peers addressing their own cloud migration and transformation? Rapid7 customers including Jeffrey Gardner from Landmark Health, Tony Hamil from Hillwood Development Company, and John Harte from Starr Companies, will share their strategies, approaches, and best practices as they securely advance their businesses.
Tas Giakouminakis, Co-Founder & Chief Technology Officer, Rapid7
Journey back to the future with Rapid7’s Chief Technology Officer, Tas Giakouminakis, as he examines the consequences of prioritizing innovation at the expense of security, and how our internet-connected-"everything" future has never been brighter, provided we're willing to improve how we build resilience into our systems and processes.
Achieving Impact & Outcomes
Advancing Your Cloud Security Program
Learn how to remediate vulnerabilities faster with Rapid7’s InsightVM. You’ll explore how to ensure all of your EC2 instances in AWS are assessed for vulnerabilities without the need for scan engines or credentials, while also receiving real-time remediation information for your misconfigurations in AWS including password policies and security group settings.
As you shift more infrastructure into cloud environments, what proactive measures should you take to reduce exposure? Hear about key configuration mistakes that can be easily identified, using live examples from Rapid7's internet scanning project, Sonar, and global honeynet, Heisenberg.
Wondering what types of breaches your peers are experiencing? Hear from experts who have responded to breaches in both on-premise environments as well as cloud deployments to learn the differences in response approaches, how to handle vendor uncertainty, and what you should be incorporating into your existing program.
Learn how to gain visibility across your entire environment, detect attackers with analytics, and automate your response to conserve manpower with Rapid7’s InsightIDR. To speed up the incident detection and response lifecycle, you’ll automate the identification and quarantining process of an asset running unauthorized software.
Cloud technologies provide unbridled power to expand your company’s infrastructure. However, if left unchecked you can be exposed to a new threat vector for hackers to exploit. Learn how cloud assessment and user behavior threat detection capabilities will help ensure a secure journey to the cloud.
Cloud security is complex. Partnering and integrating with your cloud and on-prem ecosystem is essential to mitigating threats. Gain an understanding of the various cloud technologies that exist today, and learn how you can overcome the operational challenges managing and securing these environments.
Learn how to eliminate the burden of manually managing user accounts. Accelerating and streamlining your time-intensive processes is a key way to improve your security posture. You’ll walk through a variety of automation use cases and build a workflow that automates the de-provisioning of user accounts to see InsightConnect in action.
As threats have evolved, cloud-driven remediation has become a key component to a secure infrastructure. With the help of AWS Security Hub, learn how you can not only collect, analyze and remediate threats in your cloud infrastructure but automate the process so you can do so without any human intervention.
Cybersecurity program challenges are not limited to particular companies or industries. Learn more about the most common challenges security leaders have in running enterprise programs, strategies for aligning internally with technology teams, and presenting meaningful risks to your business leaders.
200 Seaport Boulevard
Boston, MA 02210
Located in Boston’s Seaport District (right by the Boston Convention and Exhibition Center, the scene of AWS re:Inforce)
We will validate all self-parking passes for the Seaport Hotel garage.