2016 Amazon Re-Invent Security Sessions

2016 Amazon Re-Invent Security Session

Security & Compliance track

SAC201: Lessons from a Chief Security Officer: Achieving Continuous Compliance in Elastic Environments

SAC303: Become an AWS IAM Policy Ninja in 60 Minutes or Less

SAC304: Predictive Security: Using Big Data to Fortify Your Defenses

SAC305: How AWS Automates Internal Compliance at Massive Scale using AWS Services

SAC306: Encryption: It Was the Best of Controls, It Was the Worst of Controls

SAC307: The Psychology of Security Automation

SAC308: Hackproof Your Cloud: Responding to 2016 Threats

SAC309: You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Validation from Adobe

SAC310: Securing Serverless Architectures, and API Filtering at Layer 7

SAC311: Evolving an Enterprise-Level Compliance Framework with Amazon CloudWatch Events and AWS Lambda

SAC312: Architecting for End-to-End Security in the Enterprise

SAC313: Enterprise Patterns for Payment Card Industry Data Security Standard (PCI DSS)

SAC314: GxP Compliance in the Cloud

SAC315: Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?

SAC316: Security Automation: Spend Less Time Securing Your Applications

SAC317: IAM Best Practices to Live By

SAC318: Life Without SSH: Immutable Infrastructure in Production

SAC319: Architecting Security and Governance Across a Multi-Account Strategy

SAC320: Deep Dive: Implementing Security and Governance Across a Multi-Account Strategy

SAC321: Cyber Resiliency – Surviving the Breach

SAC322: NEW LAUNCH: AWS Shield—A Managed DDoS Protection Service

SAC323: NEW SERVICE: Manage Multiple AWS Accounts with AWS Organizations

SAC326: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation

SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime

SAC401: 5 Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules

SAC402: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security

re:Source Mini Con for Security Services

SEC301: Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks

SEC303: Get the Most from AWS KMS: Architecting Applications for High Security

SEC304: Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service

SEC305: Scaling Security Resources for Your First 10 Million Customers

SEC307: Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale

  • Video to come

SEC308: Securing Enterprise Big Data Workloads on AWS

SEC309: Proactive Security Testing in AWS: From Early Implementation to Deployment Penetration Testing

SEC310: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases

SEC311: How to Automate Policy Validation

SEC312: re:Source Mini Con for Security Services State of the Union

SEC313: Automating Security Event Response, from Idea to Code to Execution

SEC314: Common Considerations for Data Integrity Controls in Healthcare

SEC401: Automated Formal Reasoning About AWS Systems

Leave a Reply

Your email address will not be published. Required fields are marked *