sc-1

This session will cover how operating on the AWS cloud helps you manage risk and remain competitive in an ever changing landscape. We will review how to manage confidentiality, integrity, compliance and availability on AWS.

David Kaplan, Security Specialist, Amazon Web Services


sc-2

Understand AWS best practices for DDoS resiliency and how AWS Shield can assist you to protect your business.

Uti Alatan, CloudFront, Amazon Web Services


sc-3

Providing more control around how to manage your AWS accounts with our newly launched service - AWS Organizations. In this session we'll look at aspects affecting your account management before and after AWS Organizations, how AWS Organizations can programmatically create and manage your AWS accounts and apply organisational controls with familiar policies across these accounts to meet your business needs. We'll also cover best practices and troubleshooting tips to get you started.

Pierre Liddle, Solutions Architect, Amazon Web Services


sc-4

Data protection is more important than ever. Maintaining confidentiality and integrity of your data at scale does not have to be a burden. In this session we will discuss encryption options on AWS and how to leverage AWS Key Management Service (KMS) for data encryption. We will also cover how AWS KMS integrates with other AWS services.

Koorosh Lohrasbi, Solutions Architect, Amazon Web Services


sc-5

Security will always be our top priority. Agile deployment methods require a set of dynamic built-in security controls that keep pace with innovation and scale. In this session we will utilise the power of automation with the AWS platform to increase the agility of developers while maintaining a strong security posture.

David Faulkner, Senior Technical Account Manager, Amazon Web Services

Aaron McKeown, Lead Security Architect, Xero


sc-10

As your use of the AWS platform matures and evolves you need to be continuously looking at ways to improve your security posture and take advantage of new security services and features. In this advanced technical session we will share architecture patterns for different workloads, IAM policy tips & tricks, how to implement security automation and for forensics. Be prepared for a technically deep session on AWS security.

Ben Potter, AWS Cloud Security Consultant, Amazon Web Services


sc-6

By leveraging serverless architectures, organisations are building and running modern applications and services with increased agility and simplified scalability—all without managing a single server. Many applications need to manage user identities and support sign-in/sign-up. In this session, we dive deep on how to support millions of user identities, as well as how to integrate with social identity providers and existing corporate directories. We will show the real-world design patterns that AWS customers use to implement authentication and authorisation.

Myles Hosford, Security Solutions Architect, Amazon Web Services


sc-7

This talk showcases the "best of the best" practices for operating securely at scale on AWS, taken from real customer examples. It introduces the AWS Security Best Practices whitepaper and covers a range of security recommendations for Identity and Access Management, Logging and Monitoring, Infrastructure Security, and Data Protection. It incorporates practical examples found in the Center for Internet Security’s CIS AWS Foundation and CIS AWS Three-Tier Web Architecture benchmarks. Come learn how to "Just Turn It On!"

Phil Rodrigues, Security Solutions Architect, Amazon Web Services

Michael Fuller, Principal Systems Engineer, Atlassian


sc-8

In this session, we take a look at a serverless approach to operational insights leveraging AWS Elasticsearch, AWS Athena and Amazon Alexa, to provide increased visibility to your infrastructure. We will dive in to logs from various AWS services including CloudTrail, Elastic Load Balancer, VPC Flow Logs and more.

Greg Sporton, AWS Sr Technical Account Manager, Amazon Web Services


sc-9

Containers have had an incredibly large adoption rate since Docker was launched, especially from the developer community, as it provides an easy way to package, ship, and run applications. Securing your container-based application is now becoming a critical issue as applications move from development into production. In this session, you learn ways to implement storing secrets, distributing AWS privileges using IAM roles, protecting your container-based applications with vulnerability scans of container images, and incorporating automated checks into your continuous delivery workflow.

Clayton Brown, Ecosystem Solutions Architect, Amazon Web Services

Mathew Finch, Infrastructure Architect, nib Health Funds