Personal Information
Organization / Workplace
Hangzhou, Zhejiang China
- Presentations
- Documents
- Infographics
Automated Security & Continuous Compliance on Microsoft Azure
2nd Watch
•
5 years ago
Multi-Tenant Identity and Azure Resource Governance - Identity Days 2019
Marius Zaharia
•
4 years ago
Azure sentinel
Marius Sandbu
•
4 years ago
Compliance As Code
Ebru Cucen Çüçen
•
5 years ago
Azure Security Fundamentals
Lorenzo Barbieri
•
5 years ago
Top Azure security fails and how to avoid them
Karl Ots
•
5 years ago
Techorama Belgium 2019: top Azure security fails and how to avoid them
Karl Ots
•
4 years ago
Microsoft Azure Security Overview
Alert Logic
•
6 years ago
Top 5 AWS Security Mistakes and How to Stop Them Before You Lose Data
DevOps.com
•
4 years ago
Hands-on with AWS Security Hub - FND213-R - AWS re:Inforce 2019
Amazon Web Services
•
4 years ago
Security at the speed of cloud: How to think about it & how you can do it now - GRC304 - AWS re:Inforce 2019
Amazon Web Services
•
4 years ago
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Amazon Web Services
•
4 years ago
Automating AWS security and compliance
John Varghese
•
4 years ago
Netpluz Managed SOC - MSS Service
Netpluz Asia Pte Ltd
•
4 years ago
Managed Security Services from Symantec
Arrow ECS UK
•
10 years ago
安全托管服务MSS
建琪 褚
•
13 years ago
DevSecOps reference architectures 2018
Sonatype
•
6 years ago
AWS Security, IAM, Databases, Elasticity, Management Tools - AWSome Day Philadelphia 2019
Amazon Web Services
•
5 years ago
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
Amazon Web Services
•
10 years ago
Introduction to Amazon EC2
Amazon Web Services
•
10 years ago