{"id":68209,"date":"2024-08-06T18:44:03","date_gmt":"2024-08-06T10:44:03","guid":{"rendered":"https:\/\/www.nextlink.cloud\/?post_type=event&#038;p=68209"},"modified":"2024-08-26T18:44:04","modified_gmt":"2024-08-26T10:44:04","slug":"cloud-secops-in-action-enhance-your-security-posture","status":"publish","type":"event","link":"https:\/\/www.nextlink.cloud\/en\/event\/cloud-secops-in-action-enhance-your-security-posture\/","title":{"rendered":"Cloud SecOps on AWS &#8211; Enhance Your Security Posture"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Key Takeaways<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Integrate Cloud SecOps with AWS<\/h3>\n\n\n\n<p>Discover how to integrate AWS\u2019s powerful security tools with Check Point\u2019s solutions for a unified, proactive Cloud SecOps framework. Learn to build a security-first approach, using AWS\u2019s Security Maturity Model and data protection strategies with AWS Macie.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhance Your Cloud Security with Check Point<\/h3>\n\n\n\n<p>Strengthen your cloud defenses with Check Point\u2019s advanced security solutions. Gain insights into automating threat detection and ensuring compliance in your cloud operations. Join the seminar for best practices and real-world applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Nextlink: Proven Cloud Security Solutions<\/h3>\n\n\n\n<p>See how Nextlink has helped top Hong Kong companies achieve robust cloud security. Learn from real case studies and explore how Nextlink can tailor security measures to your business needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Agenda<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><div class=\"table-responsive\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Time <\/th><th class=\"has-text-align-left\" data-align=\"left\">Topic<\/th><th class=\"has-text-align-left\" data-align=\"left\">Speaker<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\">1430 &#8211; 1500 (30 mins)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Registration &amp; greeting<\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1500 &#8211; 1510 (10 mins)<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Understanding the Current Threat Landscape<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">John Chen, Check Point<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1510 &#8211; 1540&nbsp;(30 mins)<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Implementing Cloud SecOps with Check Point and AWS<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">Zen Chan, Check Point<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1540 &#8211; 1600 (20 mins)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Coffee Break <\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1600 &#8211; 1620 (20 mins)<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Advancing Security with AWS<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">Henry Ho, AWS<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1620 &#8211; 1650 (30 mins) <\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Enhancing Security with Nextlink\u2019s Expertise<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">Benny Lee, Nextlink<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1650 &#8211; 1700 (10 mins) <\/td><td class=\"has-text-align-left\" data-align=\"left\">Closing Remarks<\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1700 &#8211; 1730 (30 mins) <\/td><td class=\"has-text-align-left\" data-align=\"left\">Q&amp;A and Networking<\/td><td class=\"has-text-align-left\" data-align=\"left\"><\/td><\/tr><\/tbody><\/table><\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Register Now!<\/h2>\n\n\n\n<p>Don\u2019t miss this opportunity to advance your cloud security knowledge and practices. Limited seats are available, so <a href=\"https:\/\/www.surveycake.com\/s\/39W8D\"><strong>register today<\/strong><\/a> to secure your spot.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key Takeaways Integrate Cloud SecOps with AWS Discover how to integrate AWS\u2019s powerful security tools with Check Point\u2019s solutions for a unified, proactive Cloud SecOps framework. Learn to build a security-first approach, using AWS\u2019s Security Maturity Model and data protection strategies with AWS Macie. Enhance Your Cloud Security with Check Point Strengthen your cloud defenses [&hellip;]<\/p>\n","protected":false},"template":"","class_list":["post-68209","event","type-event","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/event\/68209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/types\/event"}],"version-history":[{"count":12,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/event\/68209\/revisions"}],"predecessor-version":[{"id":69190,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/event\/68209\/revisions\/69190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media\/68283"}],"wp:attachment":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media?parent=68209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}