AWS Security Blog
Tuesday, November 29: Security and Compliance Sessions Today at re:Invent
Today, the following security and compliance sessions will be presented at AWS re:Invent 2016 in Las Vegas. All times are local. See the re:Invent Session Catalog for complete information about every session. You can also download the AWS re:Invent 2016 Event App for the latest updates and information.
If you are not attending re:Invent 2016, keep in mind that all videos of and slide decks from these sessions will be made available next week. We will publish a post on the Security Blog next week that links to all videos and slide decks.
9:30 A.M.
- SAC202 (The Mirage): Workshop: Secure Your Web Application with AWS WAF and Amazon CloudFront
10:00 A.M.
- SAC326 (The Venetian): How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation
11:00 A.M.
- SAC309 (The Venetian): You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Validation from Adobe
- SEC312 (The Mirage): re:Source Mini Con for Security Services State of the Union
12:30 P.M.
- SEC301 (The Mirage): Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks
- SEC305 (The Mirage): Scaling Security Resources for Your First 10 Million Customers
- SEC306 (The Mirage): Workshop: Choose Your Own SAML Adventure: A Self-Directed Journey to AWS Identity Federation Mastery
- SEC308 (The Mirage): Securing Enterprise Big Data Workloads on AWS
1:00 P.M.
- SAC308 (The Venetian): Hackproof Your Cloud: Responding to 2016 Threats
2:00 P.M.
- SAC321 (The Venetian): Cyber Resiliency – Surviving the Breach
- SEC307 (The Mirage): Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale
- SEC310 (The Mirage): Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases
- SEC314 (The Mirage): Common Considerations for Data Integrity Controls in Healthcare
3:30 P.M.
- SEC302 (The Mirage): Workshop: Adhere to the Principle of Least Privilege by Using AWS Identity and Access Management (IAM) and Amazon Virtual Private Cloud (VPC)
- SEC311 (The Mirage): How to Automate Policy Validation
- SEC313 (The Mirage): Automating Security Event Response, from Idea to Code to Execution
- SEC401 (The Mirage): Automated Formal Reasoning About AWS Systems
5:00 P.M.
- SEC303 (The Mirage): Get the Most from AWS KMS: Architecting Applications for High Security
- SEC304 (The Mirage): Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service
- SEC309 (The Mirage): Proactive Security Testing in AWS: From Early Implementation to Deployment Penetration Testing
– Craig