The Internet of Things on AWS – Official Blog

Your guide to AWS IoT at re:Inforce 2019

AWS re:Inforce June 25-26 2019

The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and companies, IoT devices and their data must be secured.

Here are sessions from this year’s lineup to help you plan your event agenda. For a full list of sessions, see the re:Inforce session catalog.

Keynote – AWS Cloud Security: Moving forward in the cloud

Tuesday, June 24, 9:30am
Stephen Schmidt, VP and Chief Information Security Officer, AWS 
During this keynote, you will gain helpful insights into how Amazon Web Services (AWS) manages security at scale, and hear from customers in regulated industries about their experiences with security, compliance, identity, and governance in the cloud.

SDD307-R – [REPEAT] Protecting your IoT fleet

This builder session takes place several times: 
Tuesday, Jun 25, 11:30 AM – 12:30 PM– Level 1, Room 151B, Table 3
Tuesday, Jun 25, 2:30 PM – 3:30 PM– Level 1, Room 151B, Table 3
Tuesday, Jun 25, 5:30 PM – 6:30 PM– Level 1, Room 151B, Table 3
Wednesday, Jun 26, 8:00 AM – 9:00 AM– Level 1, Room 151B, Table 3
Wednesday, Jun 26, 11:00 AM – 12:00 PM– Level 1, Room 151B, Table 3
Wednesday, Jun 26, 5:00 PM – 6:00 PM– Level 1, Room 151B, Table 3

Whether you’re selling millions of IoT devices to customers or deploying thousands to your own factories, protecting your IoT fleet can be difficult. With AWS, you can quickly deploy, manage, and audit your devices’ security posture consistently and continuously. In this builder session, learn how to securely deploy a provided IoT sensor with its own certificate, register the device with a simple function, and then audit the device’s security posture against best practices. All attendees need a laptop, an active AWS account, an IAM administrator, and a familiarity with core AWS services.

SEP203 – Leverage the security & resiliency of the cloud & IoT for industry use cases

Tuesday, Jun 25, 11:30 AM – 1:30 PM– Level 2, Room 210B
Anton Shmagin – Partner Solutions Architect, AWS IoT

Michael South – Americas Regional Leader, Public Sector Security & Compliance, AWS
This non-technical two-hour Internet of Things (IoT) tabletop exercise benefits business and technology leaders and regulators in the Energy, Oil and Gas, Transportation, Healthcare, Financial, and Manufacturing sectors. Through discussion of a simulated cyber IoT incident, you explore required capabilities and processes. You learn how to leverage AWS for security, high availability, incident response, and continuity of operations for systems that include IoT. You also discuss the advantages of cloud security and resiliency over traditional on-premises environments to understand your opportunities. Finally, the effectiveness of international cybersecurity frameworks in improving an organization’s posture is highlighted. No laptops required.

SEP208 – Designing for data privacy on AWS

Tuesday, Jun 25, 1:00 PM – 2:00 PM– Level 2, Room 207
Carl Mathis – Security Architect, AWS
AWS can help enterprises ensure that data privacy requirements are met in a timely and efficient way. In this session, we show you how you can use Amazon Athena to quickly address the right to be forgotten, erasure, or restriction of processing requests when sensitive data is held in Amazon S3. We show you how to use AWS Lambda for just-in-time privacy notices. We also show you how AWS IoT services can assist in adhering to “Do Not Track” requirements or address implied consent by modifying default browser settings. Learn how AWS services can be leveraged to support an architectural approach to help customers meet data privacy and protection requirements.

DEV04 – IoT security: Prevent your devices from becoming attack vectors

Tuesday, Jun 25, 3:00 PM – 3:30 PM– Level 0, Dev Lounge Hall A + B1
Amir Kashani, VP of Cloud Native Development, Onica Group LLC 
The Internet of Things (IoT) is enabling new and existing businesses to build better products, provide new services, and improve business outcomes through a more connected world. The same connectivity provides malicious actors with billions of new targets to steal data from, take control of systems from, or otherwise wreak havoc on. In this talk, we discuss key threats to be aware of when building an IoT device or platform. We also cover ways to mitigate the risks.

SEP206 – Securing Internet of Things (IoT) deployment with AWS

Tuesday, Jun 25, 4:00 PM – 5:00 PM– Level 2, Room 212
Momena Cheema – Cloud Security Strategist, AWS Security 
Dan Griffin – Software Development Engineer, AWS IoT
Learn how AWS can enable business productivity and intelligence with security from the start using our suite of IoT services. This session addresses common IoT security questions across different industries and walks through the steps taken when building secure solutions that blend the AWS Cloud and AWS IoT services. It also highlights questions that security and engineering teams should ask as they architect their solutions and offer recommendations on IoT best practices such as pushing automatic patching updates and monitoring activity across devices.

FND212 – Amazon FreeRTOS security best practices

Tuesday, Jun 25, 5:30 PM – 6:30 PM– Level 0, Hall B2, Yellow
Dan Griffin – Software Development Engineer, AWS IoT
Amazon FreeRTOS is an open-source operating system for cloud-connected embedded devices. As customers start working on embedded Internet of Things projects, they ask AWS for security best practices. In this session, we discuss provisioning, device authentication and authorization, secure software updates, and monitoring. Finally, we show these lifecycle considerations in context by demonstrating an over-the-air firmware update to an embedded developer board, highlighting the many security-relevant steps in the workflow.

SEP318-L – Leadership session: Aspirational security

Wednesday, Jun 26, 11:45 AM – 12:45 PM– Level 2, Room 253B
Eric Brandwine – VP/Distinguished Engineer, AWS Security 
How does the cloud foster innovation? Join Vice President and Distinguished Engineer Eric Brandwine as he details why there is no better time than now to be a pioneer in the AWS Cloud, discussing the changes that next-gen technologies such as quantum computing, machine learning, serverless, and IoT are expected to make to the digital and physical spaces over the next decade. Organizations within the large AWS customer base can take advantage of security features that would have been inaccessible even five years ago; Eric discusses customer use cases along with simple ways in which customers can realize tangible benefits around topics previously considered mere buzzwords.

FND330 – Securing the edge with AWS IoT services

Wednesday, Jun 26, 12:30-1:30 PM– Level 0, HallB2, Red
Scott Allison – Sr. Technical Product Manager, AWS IoT Greengrass 
Indraneel Mitra – Sr. Solutions Architect, IoT Specialist, AWS
Edge computing is one of the most important enablers of the future. It saves lives, democratizes resources, and reduces costs in scenarios where near real-time action is required. This session covers how to keep edge computing secure. We dive deep into how AWS IoT Greengrass authenticates and encrypts device data for local and cloud communications so that data is never exchanged without proven identity. You can leverage hardware-secured, end-to-end encryption for messages exchanged between devices, an AWS IoT Greengrass core, and the AWS Cloud, and for messages between an AWS IoT Greengrass core and other local devices using the AWS IoT device SDK.

SDD325 – Bose uses AWS IoT to securely connect millions of devices and improve IT agility

Wednesday, Jun 26, 1:15 PM – 2:15 PM– Level 2, Room 205B
Peter Bounora, Enterprise Solutions Architect, AWS 
Satyendra Thakur, CISO, Bose
As a result of moving to AWS, Bose retired its first data center in 2018, and its second data center is closing later this year. In this session, Bose’s head of security discusses the company’s journey to the cloud and how it moved hundreds of workloads and services to AWS using a shared services model. This included business-critical environments that are in scope for regulatory compliance and SAP applications that are paramount to running the business. On the product side, this session covers how Bose securely connected millions of devices to AWS IoT, which required multiple iterations of security controls, policies, and standards.

FND321 – Keeping edge computing secure

Wednesday, Jun 26, 3:30 PM – 4:30 PM– Level 1, Room 151B, Table 8
Neel Mitra, Sr. SA, IoT Specialist
Edge computing is one of the most important enablers of the future. It saves lives, democratizes resources, and reduces costs in scenarios where near-real time action is required. This session covers how to keep edge computing secure. We dive deep into how AWS IoT Greengrass authenticates and encrypts device data for local and cloud communications so that data is never exchanged without proven identity. You can leverage hardware-secured, end-to-end encryption for messages exchanged between devices, an AWS IoT Greengrass core, and the AWS Cloud, and for messages between an AWS IoT Greengrass core and other local devices using the AWS IoT device SDK.

Please note that session information is subject to change. For more information, see the re:Inforce catalog for sessions focused on IoT security.

Securing Your Devices from the Edge to the Cloud
Not able to attend re:Inforce? Attend our upcoming webinar for more information about how you can use AWS IoT Greengrass, Amazon FreeRTOS, AWS IoT Core, and AWS IoT Device Defender. These services help you keep data secure, restrict access to devices and cloud resources, securely connect to the cloud, and audit device usage.

Securing Your Devices from the Edge to the Cloud
June 24 | 11:00 AM – 12:00 PM PT
Register Now