Prisma Cloud (formerly Twistlock)

Prisma cloud

[AWS, Palo Alto Networks, Macnica Joint Webinar] High-quality security design and practice in cloud-native environments

Features of the seminar

(1) Examples of using cloud platforms (2) How to deal with inadequate settings of cloud services (3) Prioritization of vulnerabilities detected in large numbers Explained together!

As an approach to accelerate and expand business, digitization and automation of various processes related to commercial transactions can be said to be very effective means. System usage is a requirement. Using the cloud is the fastest way to meet these requirements. In the first half of this seminar, we will introduce the features and usage examples of Amazon Web Services (AWS), a pioneer of cloud platforms.

On the other hand, although the cloud is secure and convenient, it is also true that there are places where you should apply security at your own responsibility. How should a nontraditional cloud-native environment be protected and operated? In the second half of the session, we will explain the overview of cloud security provided by Prisma Cloud and the approach to dealing with vulnerabilities that are detected in large numbers.

Schedule/Application

schedule

time

venue

Application

Scheduling

How to participate in the online seminar

  • Please register the necessary information from "Apply here" at the top of this page.
  • We will email you the login URL for the online seminar by 17:00 the day before the event. *
  • On the day of the event, when it is time, please access from the login URL and listen to the lecture.

※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、devops-sales@macnica.co.jpまでご連絡ください。

*Registration is required to attend. Please refrain from sharing your login URL.

Event requirements

Venue

Held as an online seminar

*You can perform a connection test in advance from the following URL.

https://zoom.us/test
Capacity none
Preparation What to prepare on the day
  • PC to attend the online seminar
  • Environment for Internet connection
subject
  • SRE、DevOps、開発、セキュリティ、IT部門のご担当者様
  • Customers using AWS, customers considering/using Prisma Coud
  • Customers who have trouble dealing with vulnerabilities
  • Customers considering cloud security measures
Organizer
  • Macnica
  • Macnica Solutions Corp.
Co-sponsored
  • Amazon Web Services Japan G.K.
  • Palo Alto Networks, Inc.
Cost Free (pre-registration required)

Program

16:00~16:05
opening
16:05~16:35
Features of AWS global infrastructure that enable focus on value creation
In order to create value that is important for business, it is necessary to reduce low-value work that does not lead to business differentiation and concentrate on value creation, which should be the original focus, while responding to high security and compliance requirements. In this session, we will explain how you can focus on value creation by using the AWS global infrastructure, including the features of the AWS global infrastructure.
Amazon Web Services Japan G.K.
Partner Solution Architect
Yuki Iida
16:35~16:40
Break (5 minutes)
16:40~17:10
Commentary on guidelines for preventing and deterring configuration errors in cloud services
The [Ministry of Internal Affairs and Communications] has recently provided guidelines on appropriate settings for the provision and use of cloud services.
Currently, the Ministry of Internal Affairs and Communications is organizing specific measures to use and provide safe and secure cloud services so that setting defects do not occur in consideration of setting defects or user-side mistakes and lack of understanding.
Through this session, we will explain the cloud threats behind the activities of the Ministry of Internal Affairs and Communications and take measures to eradicate misconfigurations.
Palo Alto Networks, Inc.
Chief Technology Officer (CTO)
Ajay Misra
17:10~17:15
Break (5 minutes)
17:15~17:45
Let's deal smartly with "mass detection of vulnerabilities"
Recently, the term DevSecOps has become popular, and among them, the keyword "shift left" (addressing container image problems as early as possible in the development phase) has come to be heard. While "shift left" is a very logical idea, the number of OSS vulnerabilities detected in the development phase continues to increase, making it difficult to deal with all of them. is required. CVSS also has an index called severity, but should we only deal with Critical and High? In this session, we will introduce the concept of risk-based triage with demonstrations.
Macnica
chief engineer
Minehiko Nohara
17:45~17:50
Announcing CPPO (Consulting Partner Private Offers) on AWS Marketplace
Macnica Solutions Corp.
In charge of DevOps
Tomoyo Tada
17:50~18:00
Q&A/Closing

*The program is subject to change without notice. Please note. Please check this web page for the latest information.

Due to the impact of the COVID-19, we will continue to work as a telework (work from home) for the time being.
If you have any questions about the seminar, please contact us using the product inquiry form or email address.

Inquiry/Document request

In charge of Macnica DevOps

Mon-Fri 8:45-17:30