AWS re:Invent Sponsored Session

Session Title:  Why IAM is the new perimeter and how to govern it.
Time: 5:30 PM – 6:30 PM
Session Date: Monday – Dec 2, 2019
Session Location: Venetian, Level 2, Titian 2205
Speakers: Stephen MacIntyre -VP – ECC Shared Security Services Lead, Fidelity Investments / Brian Johnson – CEO, DivvyCloud / Jason Pryor – Cloud Security Architect, 3M / Chris Porter -CISO, Fannie Mae

Session description: Everything has an identity on AWS: users, applications, services, and systems. This provides enormous flexibility, but it also requires careful and specialized governance. In this session, hear from a panel of technology leaders on why this security layer requires a modern approach on AWS, and learn their best practices for addressing perimeter fluidity while running AWS at scale. This presentation is brought to you by DivvyCloud, an APN Partner.

Schedule a meeting

Meet our Experts

← Schedule a meeting with our solution architects to get a personalized demo of DivvyCloud’s out of the box policies to automate the assessment and remediation of your AWS security and compliance posture.

Remediate, policy violations and misconfigurations in real-time before they’re exploited.

DivvyCloud Overview

DivvyCloud enforces security and compliance policies in real-time, empowering customers to give developers freedom to innovate using AWS, GCP, Azure, Kubernetes, and Alibaba. Customers like 3M, Fannie Mae, General Electric, Autodesk, Discovery, Twilio, and Pizza Hut, use DivvyCloud to automate the detection and remediation of cloud and container infrastructure misconfigurations that violates policy and security risk.

DivvyCloud enables these industry leaders to take full advantage of agility and speed of cloud and container technology, while actually strengthening their security and compliance posture. This is a double win that increases productivity, innovation, profitability and security.

DivvyCloud is designed for cloud infrastructure, security, compliance, and governance professionals who want to identify risks in real-time and take automatic, user-defined action to fix problems before they’re exploited.


Why IAM is the New Perimeter, and How to Govern It

AWS re:Invent 2019 Featured Session Speakers: Stephen MacIntyre -VP –… 

View all Blog Posts
Product Information

Feature Release 19.5

We are excited to announce our latest product features… 

View all Blog Posts

Five CISO Priorities

Dark Reading recently published an article describing the top… 

View all Blog Posts