How to get Visibility into your EC2 Instances within AWS

Watch the Webcast On-Demand

Watch It Now!

Join us for a technical training session to learn about the risks associated with AWS EC2 instances, the unexpected impact potential of a compromised EC2 instance and best practices for EC2 threat detection.

During this one-hour session, our technical expert will explore:

  • Attack techniques used to compromise EC2 instances
  • Persistence techniques used to maintain access to a compromised instance
  • Access escalation methods used once an instance is compromised
  • Available prevention, monitoring and detection tactics

Meet Your Host

Tom D’Aquino

Sr. Director Customer Success Enablement

Tom D'Aquino is a Cyber security practitioner that cut his teeth in a 24x7 SOC back in the days of the Code Red and Nimda worms. Since then, Tom has turned his attention to architecting and implementing enterprise security monitoring solutions and is currently responsible for driving AlienVault's Customer Success Enablement initiatives.