2016 Amazon Re-Invent Security Session
Security & Compliance track
SAC201: Lessons from a Chief Security Officer: Achieving Continuous Compliance in Elastic Environments
SAC303: Become an AWS IAM Policy Ninja in 60 Minutes or Less
SAC304: Predictive Security: Using Big Data to Fortify Your Defenses
SAC305: How AWS Automates Internal Compliance at Massive Scale using AWS Services
SAC306: Encryption: It Was the Best of Controls, It Was the Worst of Controls
SAC307: The Psychology of Security Automation
SAC308: Hackproof Your Cloud: Responding to 2016 Threats
SAC309: You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Validation from Adobe
SAC310: Securing Serverless Architectures, and API Filtering at Layer 7
SAC311: Evolving an Enterprise-Level Compliance Framework with Amazon CloudWatch Events and AWS Lambda
SAC312: Architecting for End-to-End Security in the Enterprise
SAC313: Enterprise Patterns for Payment Card Industry Data Security Standard (PCI DSS)
SAC314: GxP Compliance in the Cloud
SAC315: Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?
SAC316: Security Automation: Spend Less Time Securing Your Applications
SAC317: IAM Best Practices to Live By
SAC318: Life Without SSH: Immutable Infrastructure in Production
SAC319: Architecting Security and Governance Across a Multi-Account Strategy
SAC320: Deep Dive: Implementing Security and Governance Across a Multi-Account Strategy
SAC321: Cyber Resiliency – Surviving the Breach
SAC322: NEW LAUNCH: AWS Shield—A Managed DDoS Protection Service
SAC323: NEW SERVICE: Manage Multiple AWS Accounts with AWS Organizations
SAC326: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation
SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime
SAC401: 5 Security Automation Improvements You Can Make by Using Amazon CloudWatch Events and AWS Config Rules
SAC402: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security
re:Source Mini Con for Security Services
SEC301: Audit Your AWS Account Against Industry Best Practices: The CIS AWS Benchmarks
SEC303: Get the Most from AWS KMS: Architecting Applications for High Security
SEC304: Reduce Your Blast Radius by Using Multiple AWS Accounts Per Region and Service
SEC305: Scaling Security Resources for Your First 10 Million Customers
SEC307: Microservices, Macro Security Needs: How Nike Uses a Multi-Layer, End-to-End Security Approach to Protect Microservice-Based Solutions at Scale
- Video to come
SEC308: Securing Enterprise Big Data Workloads on AWS
SEC309: Proactive Security Testing in AWS: From Early Implementation to Deployment Penetration Testing
SEC310: Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases
SEC311: How to Automate Policy Validation
SEC312: re:Source Mini Con for Security Services State of the Union
SEC313: Automating Security Event Response, from Idea to Code to Execution
SEC314: Common Considerations for Data Integrity Controls in Healthcare
SEC401: Automated Formal Reasoning About AWS Systems