Webinar
Introduction To Cloud Security & IAM Policy Configuration Level Review
calendar-alt-min
Date:
December 14th, 2022
Time 2
Time:
11:00 AM IST
host
Host:
Vaishali Nagori, Subho Halder

Watch Webinar

About Speaker
Vaishali-1

Vaishali is a Penetration Tester, as well as a Dancer and a Learner. She works as a security analyst. She has worked with Web Applications, APIs, Android, and iOS Penetration Testing. She has secured over 70 applications from a variety of industries, including e-commerce, banking, management, gaming, trading, government, tax management, and financial services. 

LinkedIn Twitter
Subho

Subho Halder  CISO and Co-Founder of Appknox (Highest rated mobile Security Solution in Gartner and G2Crowd ). Subho will run you through best practices that he has  accumulated from years of experience in Enterprise Security.

Subho is well known in the Security industry as a master hacker and creator of AFE (Android framework for Exploitation). He has also  detected critical loopholes in businesses like Google, Facebook  Microsoft, Skype, and  conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec and  RSA Conference.

LinkedIn Twitter
Understanding Cloud Security & IAM Policy

Join us in an exciting webinar with Vaishali, Associate Security Analyst at Appknox. Know how Fortune 500 companies have configured IAM Policy.

Agenda

white_shield_icon
Introduction to Cloud Computing
white_shield_icon
Introduction to Cloud Security
white_shield_icon
CIS-Bench Mark
Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Back Next
This Webinar Will Be of Interest To:

  • Security / risk officers

  • Software / Mobile security architects

  • Product Managers

  • Mobile Developers

  • CISO’S