AWS Security Blog
Thursday, November 30: Security, Compliance, & Identity Sessions Today at re:Invent
Today, the following Security, Compliance, & Identity sessions, workshops, and chalk talks will be presented at AWS re:Invent 2017 in Las Vegas. All sessions are in the MGM Grand and all times are local. See the re:Invent Session Catalog for complete information about every session. You can also download the AWS re:Invent 2017 Mobile App for the latest updates and information.
If you are not attending re:Invent 2017, keep in mind that all videos of and slide decks from these sessions will be made available next week. We will publish a post on the Security Blog next week that links to all available videos and slide decks.
11:30 A.M.
- SID210: A CISO’s Journey at Vonage: Achieving Unified Security at Scale
- SID308: Multi-Account Strategies
- SID321: How Capital One Applies AWS Organizations Best Practices to Manage Multiple AWS Accounts
- SID336-R: Use AWS to Effectively Manage GDPR Compliance
- SID338-R: Governance@scale
- SID342: Protect Your Web Applications from Common Attack Vectors Using AWS WAF
12:15 A.M.
- SID309-R2: Credentials, Credentials, Credentials, Oh My!
- SID318: From Obstacle to Advantage: The Changing Role of Security and Compliance in Your Organization
- SID324: Automating DDoS Response in the Cloud
- SID333: Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide Uniformly Scalable Security Capabilities
- SID345-R: AWS Encryption SDK: The Busy Engineer’s Guide to Client-Side Encryption
1:00 P.M.
- SID208-R2: Less (Privilege) Is More: Getting Least Privilege Right in AWS
- SID209-R2: Designing and Deploying an AWS Account Factory
- SID322: The AWS Philosophy of Security
- SID330-R: Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service
- SID346: New Launch! DNS Validation for AWS Certificate Manager
1:45 P.M.
- SID216: Cloud-Native App Protection: Web Application Security at Pearson and other customers using services like AWS WAF and AWS Shield
- SID332: Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito
2:30 P.M.
- SID338-R2: Governance@scale
- SID340: Using Infrastructure as Code to Inject Security Best Practices as Part of the Software Deployment Lifecycle
- SID402-R: An AWS Security Odyssey: Implementing Security Controls in the World of Internet, Big Data, IoT, and E-Commerce Platforms
3:15 P.M.
- SID325: Amazon Macie: Data Visibility Powered by Machine Learning for Security and Compliance Workloads
- SID341-R: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection
- SID343-R: User Management and App Authentication with Amazon Cognito
4:00 P.M.
- SID303-R: How You Can Use AWS’s Identity Services to Be Successful on Your AWS Cloud Journey
- SID308-R: Multi-Account Strategies
- SID335-R: Implementing Security and Governance Across a Multi-Account Strategy
4:45 P.M.
- SID205: Building the Largest Repo for Serverless Compliance-as-Code
- SID319: Incident Response in the Cloud
- SID328: Cloud Adoption in Regulated Financial Services
5:30 P.M.
- SID327: How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as Code
- SID335-R2: Implementing Security and Governance Across a Multi-Account Strategy
- SID404-R2: Amazon Inspector – Automating the “Sec” in DevSecOps
- SID405: Five New Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules
– Craig