• 2016 Amazon Re-Invent Security Session

    Security & Compliance track

    SAC201: Lessons from a Chief Security Officer: Achieving Continuous Compliance in Elastic Environments

    SAC303: Become an AWS IAM Policy Ninja in 60 Minutes or Less

    SAC304: Predictive Security: Using Big Data to Fortify Your Defenses

    SAC305: How AWS Automates Internal Compliance at Massive Scale using AWS Services

    SAC306: Encryption: It Was the Best of Controls, It Was the Worst of Controls

    SAC307: The Psychology of Security Automation

    SAC308: Hackproof Your Cloud: Responding to 2016 Threats

    SAC309: You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Validation from Adobe

    SAC310: Securing Serverless Architectures, and API Filtering at Layer 7

    SAC311: Evolving an Enterprise-Level Compliance Framework with Amazon CloudWatch Events and AWS Lambda

    SAC312: Architecting for End-to-End Security in the Enterprise

    SAC313: Enterprise Patterns for Payment Card Industry Data Security Standard (PCI DSS)

    SAC314: GxP Compliance in the Cloud

    SAC315: Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?

    SAC316: Security Automation: Spend Less Time Securing Your Applications

    SAC317: IAM Best Practices to Live By

    SAC318: Life Without SSH: Immutable Infrastructure in Production

    SAC319: Architecting Security and Governance Across a Multi-Account Strategy

    SAC320: Deep Dive: Implementing Security and Governance Across a Multi-Account Strategy

    SAC321: Cyber Resiliency – Surviving the Breach

    SAC322: NEW LAUNCH: AWS Shield—A Managed DDoS Protection Service

    SAC323: NEW SERVICE: Manage Multiple AWS Accounts with AWS Organizations

    SAC326: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation

    SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime

    SAC401: 5 Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules

    SAC402: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security

    re:Source Mini Con for Security Services

    SEC301: Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks

    SEC303: Get the Most from AWS KMS: Architecting Applications for High Security

    SEC304: Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service

    SEC305: Scaling Security Resources for Your First 10 Million Customers

    SEC307: Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale

    • Video to come

    SEC308: Securing Enterprise Big Data Workloads on AWS

    SEC309: Proactive Security Testing in AWS: From Early Implementation to Deployment Penetration Testing

    SEC310: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases

    SEC311: How to Automate Policy Validation

    SEC312: re:Source Mini Con for Security Services State of the Union

    SEC313: Automating Security Event Response, from Idea to Code to Execution

    SEC314: Common Considerations for Data Integrity Controls in Healthcare

    SEC401: Automated Formal Reasoning About AWS Systems