Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Thursday, November 30: Security, Compliance, & Identity Sessions Today at re:Invent

If you are not attending re:Invent 2017, keep in mind that all videos of and slide decks from these sessions will be made available next week. We will publish a post on the Security Blog next week that links to all available videos and slide decks.

11:30 A.M.

  • SID210: A CISO’s Journey at Vonage: Achieving Unified Security at Scale
  • SID308: Multi-Account Strategies
  • SID321: How Capital One Applies AWS Organizations Best Practices to Manage Multiple AWS Accounts
  • SID336-R: Use AWS to Effectively Manage GDPR Compliance
  • SID338-R: Governance@scale
  • SID342: Protect Your Web Applications from Common Attack Vectors Using AWS WAF

12:15 A.M.

  • SID309-R2: Credentials, Credentials, Credentials, Oh My!
  • SID318: From Obstacle to Advantage: The Changing Role of Security and Compliance in Your Organization
  • SID324: Automating DDoS Response in the Cloud
  • SID333: Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide Uniformly Scalable Security Capabilities
  • SID345-R: AWS Encryption SDK: The Busy Engineer’s Guide to Client-Side Encryption

1:00 P.M.

  • SID208-R2: Less (Privilege) Is More: Getting Least Privilege Right in AWS
  • SID209-R2: Designing and Deploying an AWS Account Factory
  • SID322: The AWS Philosophy of Security
  • SID330-R: Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service

1:45 P.M.

  • SID216: Cloud-Native App Protection: Web Application Security at Pearson and other customers using services like AWS WAF and AWS Shield
  • SID332: Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito

2:30 P.M.

  • SID338-R2: Governance@scale
  • SID340: Using Infrastructure as Code to Inject Security Best Practices as Part of the Software Deployment Lifecycle
  • SID402-R: An AWS Security Odyssey: Implementing Security Controls in the World of Internet, Big Data, IoT, and E-Commerce Platforms

3:15 P.M.

  • SID325: Amazon Macie: Data Visibility Powered by Machine Learning for Security and Compliance Workloads
  • SID341-R: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection
  • SID343-R: User Management and App Authentication with Amazon Cognito

4:00 P.M.

  • SID303-R: How You Can Use AWS’s Identity Services to Be Successful on Your AWS Cloud Journey
  • SID308-R: Multi-Account Strategies
  • SID335-R: Implementing Security and Governance Across a Multi-Account Strategy

4:45 P.M.

  • SID205: Building the Largest Repo for Serverless Compliance-as-Code
  • SID319: Incident Response in the Cloud
  • SID328: Cloud Adoption in Regulated Financial Services

5:30 P.M.

  • SID327: How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as Code
  • SID335-R2: Implementing Security and Governance Across a Multi-Account Strategy
  • SID404-R2: Amazon Inspector – Automating the “Sec” in DevSecOps
  • SID405: Five New Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules

– Craig



This post first appeared on AWS Blogs, please read the originial post: here

Share the post

Thursday, November 30: Security, Compliance, & Identity Sessions Today at re:Invent

×

Subscribe to Aws Blogs

Get updates delivered right to your inbox!

Thank you for your subscription

×