AWS Security Blog
Videos and Slide Decks from the AWS re:Invent 2017 Security, Compliance, & Identity Track
Whether you want to review a Security, Compliance, & Identity track session you attended at AWS re:Invent 2017, or you want to experience a session for the first time, videos and slide decks from the Security, Compliance, & Identity track are now available.
Introductory
- SID201: IAM for Enterprises: How Vanguard Strikes the Balance Between Agility, Governance, and Security
- SID202: Deep-Dive on How Capital One Automates the Delivery of Directory Services Across AWS Accounts
- SID205: Building the Largest Repo for Serverless Compliance-as-Code
- SID206: Best Practices for Managing Security Operation on AWS
- SID207: Security Change Through Feedback
- SID210: A CISO’s Journey at Vonage: Achieving Unified Security at Scale
- SID213: Managing Regulator Expectations – Lessons Learned on Positioning AWS Services from an Audit Perspective
- SID214: Best Security Practices in the Intelligence Community
- SID216: Cloud-Native App Protection: Web Application Security at Pearson and other customers using services like AWS WAF and AWS Shield
- SID217: New Launch! Introduction to Managed Rules for AWS WAF
Advanced
- SID301: Using AWS Lambda as a Security Team
- SID302: Force Multiply Your Security Team with Automation and Alexa
- SID303: How You Can Use AWS’s Identity Services to Be Successful on Your AWS Cloud Journey
- SID304: SecOps 2021 Today: Using AWS Services to Deliver SecOps
- SID306: How Chick-fil-A Embraces DevSecOps on AWS
- SID310: Moving from the Shadows to the Throne
- SID313: Continuous Compliance on AWS at Scale
- SID316: Using Access Advisor to Strike the Balance Between Security and Usability
- SID318: From Obstacle to Advantage: The Changing Role of Security and Compliance in Your Organization
- SID319: Incident Response in the Cloud
- SID320: Fraud Prevention, Detection, Lessons Learned, and Best Practices
- SID321: How Capital One Applies AWS Organizations Best Practices to Manage Multiple AWS Accounts
- SID322: The AWS Philosophy of Security
- SID324: Automating DDoS Response in the Cloud
- SID325: Amazon Macie: Data Visibility Powered by Machine Learning for Security and Compliance Workloads
- SID326: AWS Security State of the Union
- SID327: How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as Code
- SID328: Cloud Adoption in Regulated Financial Services
- SID329: A Deep Dive into AWS Encryption Services
- SID331: Architecting Security and Governance Across a Multi-Account Strategy
- SID332: Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito
- SID333: Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide Uniformly Scalable Security Capabilities
- SID344: Soup to Nuts: Identity Federation for AWS
- SID347: Embedding Security into DevOps on AWS with Automation Toolsets
Expert
- SID405: Five New Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules
– Craig