The Gately Report: Cybersecurity Top Priority for AWS Since Day 1, LastPass Breached Again

The massive scale of AWS means it can better fend off cybercriminals.

Edward Gately, Senior News Editor

December 2, 2022

11 Slides
Priority List

Already have an account?

Shutterstock

Amazon Web Services (AWS) launched 16 years ago with cybersecurity as a top priority, knowing it could be a “business-ending” issue. And that’s helped keep the cloud giant safe from data breaches and ransomware attacks.

Ryland-Mark_AWS.jpg

AWS’ Mark Ryland

The-Gately-Report-logo-300x200.jpgThat’s according to Mark Ryland, AWS’ director of the office of the CISO. His team’s function is handling customer engagement on behalf of AWS cybersecurity.

Cybersecurity was a hot topic at this week’s AWS re:Invent in Las Vegas. AWS unveiled Amazon Security Lake, a service that automatically centralizes an organization’s security data from cloud and on-premises sources into a data lake in a customer’s AWS account so customers can act on security data faster.

Security analysts and engineers can use the service to aggregate, manage and optimize large volumes of disparate log and event data. That aims to enable faster threat detection, investigation and incident response.

AWS Cybersecurity Priorities

We spoke with Ryland and Ryan Orsi, AWS‘ worldwide cloud foundations partner lead for security — MSSP/identity/ops/management, to find out more about AWS’ cybersecurity priorities.

Channel Futures: Was there an overall message at re:Invent for partners in terms of cybersecurity?

Orsi-Ryan_AWS.jpg

AWS’ Ryan Orsi

Ryan Orsi: I would say absolutely. I kind of tie this back to CEO Adam Selipsky‘s keynote where he announced Amazon Security Lake. It’s yet again the next evolution. Let AWS do the undifferentiated heavy lifting. We work with a lot of partners. And they have to develop their software to integrate with so many sources of logging telemetry. Wth Security Lake, they can sort of boil that down to one because now it’s a single common file-logging format. They have less code to maintain, [fewer] integrations to maintain, and they can focus more on the analytics side, the threat intelligence and threat investigation side.

See our slideshow above for more from Ryland and Orsi, and more of the week’s cybersecurity news.

Want to contact the author directly about this story? Have ideas for a follow-up article? Email Edward Gately or connect with him on LinkedIn.

About the Author

Edward Gately

Senior News Editor, Channel Futures

As senior news editor, Edward Gately covers cybersecurity, new channel programs and program changes, M&A and other IT channel trends. Prior to Informa, he spent 26 years as a newspaper journalist in Texas, Louisiana and Arizona.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like