Serverless architecture encompassing both: event-driven architectures and event-based computing, has been making the leap from theory and development environments to successful use-cases and production environments. With these leaps product owners, auditors, regulators, industry professionals, and other stakeholders have been struggling to keep up with demonstrating and validating that security controls are implemented and operating effectively. Examples shown in this presentation will be primarily AWS-based; however, the principles discussed will be applicable to a wide variety of cloud computing platforms and services.
In this webinar you will learn:
Serverless architecture encompassing both: event-driven architectures and event-based computing, has been making the leap from theory and development environments to successful use-cases and production environments. With these leaps product owners, auditors, regulators, industry professionals, and other stakeholders have been struggling to keep up with demonstrating and validating that security controls are implemented and operating effectively. Examples shown in this presentation will be primarily AWS-based; however, the principles discussed will be applicable to a wide variety of cloud computing platforms and services.
In this webinar you will learn: