YOUR ACCOUNT
MAKE A HOTEL RESERVATION
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Reserved - Scan in at least 10 minutes before the beginning of the session.
This has been added to your Planner. Please note: This is not a reserved seat.
Waitlisted - you may be assigned a reserved seat if one becomes available.

Please be sure to check the session detail of this session for a full list of repeat sessions.

Personal Calendar
 
Conference Event
Meeting
Interests
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
Meeting Summary

I'm interested in this
I'm no longer interested
 

ATE001-R - [REPEAT] AWS Ask the Experts For all things related to AWS Security, check out AWS Ask the Experts! Get your questions on identity & access management, infrastructure security, detective controls, data protection & privacy, incident response and governance, and risk & compliance (GRC) answered by AWS Security experts. General Activity
ATE001-R1 - [REPEAT 1] AWS Ask the Experts For all things related to AWS Security, check out AWS Ask the Experts! Get your questions on identity & access management, infrastructure security, detective controls, data protection & privacy, incident response and governance, and risk & compliance (GRC) answered by AWS Security experts. General Activity
ATE001-R2 - [REPEAT 2] AWS Ask the Experts For all things related to AWS Security, check out AWS Ask the Experts! Get your questions on identity & access management, infrastructure security, detective controls, data protection & privacy, incident response and governance, and risk & compliance (GRC) answered by AWS Security experts. General Activity
BTC002-R - [REPEAT] Building Serverless Compliance-as-code Compliance-as-code is the concept of automating the evaluation of recorded configurations against desired configurations, from a security and well-architected perspective. Building Serverless Compliance-as-code is a half-day, advanced-level course designed to teach you how to use, read, and write compliance-as-code to keep an AWS environment secure and optimized. The course will conclude with a hands-on Capture the Flag tournament. The goal is to build innovative compliance-as-code to be made available to millions of AWS customers on the AWS public Github. Bootcamp
BTC002-R1 - [REPEAT 1] Building Serverless Compliance-as-code Compliance-as-code is the concept of automating the evaluation of recorded configurations against desired configurations, from a security and well-architected perspective. Building Serverless Compliance-as-code is a half-day, advanced-level course designed to teach you how to use, read, and write compliance-as-code to keep an AWS environment secure and optimized. The course will conclude with a hands-on Capture the Flag tournament. The goal is to build innovative compliance-as-code to be made available to millions of AWS customers on the AWS public Github. Bootcamp
BTC006 - AWS Certification Exam Readiness: Security - Specialty The AWS Certified Security - Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, advanced-level course to learn how to prepare and succeed in the exam. We will help you prepare for the exam by exploring the exam’s domain areas and mapping them to specific areas to study. We will review sample exam questions in each domain area, teaching you how to interpret the concepts being tested so that you can better eliminate incorrect responses. Bootcamp
BUF001-R - [REPEAT] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF001-R1 - [REPEAT 1] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF001-R2 - [REPEAT 2] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF002-R - [REPEAT] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF002-R1 - [REPEAT 1] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF002-R2 - [REPEAT 2] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF003-R - [REPEAT] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF003-R1 - [REPEAT 1] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF003-R2 - [REPEAT 2] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF004-R - [REPEAT] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF004-R1 - [REPEAT 1] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF004-R2 - [REPEAT 2] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF005-R - [REPEAT] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF005-R1 - [REPEAT 1] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF005-R2 - [REPEAT 2] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF006-R - [REPEAT] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF006-R1 - [REPEAT 1] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF006-R2 - [REPEAT 2] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF007-R - [REPEAT] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF007-R1 - [REPEAT 1] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF007-R2 - [REPEAT 2] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF008-R - [REPEAT] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
BUF008-R1 - [REPEAT 1] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
BUF008-R2 - [REPEAT 2] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
CDL001-R - [REPEAT] AWS Community Developer Lounge Swing by the AWS Community Developer Lounge to relax, recharge, and connect with like-minded developers and cloud security professionals. In the Dev Lounge you can learn about community-organized Meetups, events, and workshops taking place in a city near you. Or you can gain insights and build technical skills by listening to 30 minute, community-led Dev Chat presentations. General Activity
CDL001-R1 - [REPEAT 1] AWS Community Developer Lounge Swing by the AWS Community Developer Lounge to relax, recharge, and connect with like-minded developers and cloud security professionals. In the Dev Lounge you can learn about community-organized Meetups, events, and workshops taking place in a city near you. Or you can gain insights and build technical skills by listening to 30 minute, community-led Dev Chat presentations. General Activity
CDL001-R2 - [REPEAT 2] AWS Community Developer Lounge Swing by the AWS Community Developer Lounge to relax, recharge, and connect with like-minded developers and cloud security professionals. In the Dev Lounge you can learn about community-organized Meetups, events, and workshops taking place in a city near you. Or you can gain insights and build technical skills by listening to 30 minute, community-led Dev Chat presentations. General Activity
CTC001 - Cradles to Crayon Join AWS in supporting Cradles to Crayons. The nonprofit provides children from birth through age 12 living in homeless or low-income situations and struggling with Clothing Insecurity with the essential items they need to thrive—at home, at school, and at play. At AWS re:Inforce, we will be working with Cradles to Crayons on a program that provides Hygiene Care Kits to those children between the ages of 10-12 in Massachusetts. Get involved by putting together a Hygiene Care Kit or two on Wednesday, June 26th from 7:00AM-11:00AM: Level 1, North Lobby. General Activity
CTF001-R - [REPEAT] Capture the Flag There are two parts of this event that will run simultaneous, a more traditional jeopardy style part and a Castle Defense part. The jeopardy style part will allow participants to work at their own pace through a number of security challenges to identify a specific answer (flag). During the Castle Defense part, participants will get a production workload that they will need to harden and then protect against a number of security events that will occur throughout re:Inforce. The winner will be the top combined score of both parts. Participants can work on both of these parts during breaks, lunch, or even overnight. General Activity
CTF001-R1 - [REPEAT 1] Capture the Flag There are two parts of this event that will run simultaneous, a more traditional jeopardy style part and a Castle Defense part. The jeopardy style part will allow participants to work at their own pace through a number of security challenges to identify a specific answer (flag). During the Castle Defense part, participants will get a production workload that they will need to harden and then protect against a number of security events that will occur throughout re:Inforce. The winner will be the top combined score of both parts. Participants can work on both of these parts during breaks, lunch, or even overnight. General Activity
FND201-R - [REPEAT] AWS Executive Security Simulation In this workshop, senior security management, IT, and business executive teams participate in an experiential exercise that illuminates the key decision points of a successful and secure cloud journey. During the team-based, game-like simulation, participants leverage an industry case study and make strategic decisions and investments around security, risk, and compliance. Participants experience the impact of these investments and decisions on the critical aspects of their secure cloud adoption. They also learn applicable decision and investment approaches to specific secure cloud adoption journeys. They walk through real-life examples, receive practical advice from AWS facilitators, and they leave with an understanding of the major success factors for building security, risk, and compliance in the cloud. This workshop is designed for executives who are leading a secure cloud journey, including the CISO, senior security and risk management leaders, and CIO/CTO. Non-IT participants who are key to executing the cloud security strategy are also encouraged to attend. Workshop Gili Lev
FND202 - Privacy by design on AWS This workshop is designed to support customers who apply due diligence and discovery efforts around data privacy regulations and compliance frameworks. We provide an introductory overview of AWS and data privacy. We also discuss the AWS shared responsibility model and where data can live in AWS environments. Finally, we give an overview of the available AWS services and features that support data privacy compliance. Workshop Jonathan Jenkyn Tomas Clemente Sanchez
FND203 - Mitigate risk using cloud-native infrastructure security Whether you're migrating existing workloads or creating something new in AWS, it can be tempting to bring your current security solutions with you. In this builder session, we help you identify which cloud-native solutions can mitigate the same risks while providing scalability, reliability, and cost optimization at a low operational burden. Builder Session Michael Wasielewski
FND204 - Sharing services securely across VPCs and accounts In this builder session, we briefly introduce AWS PrivateLink, and then we build an application service that we will securely make available to consumers in a different account using AWS PrivateLink. Attendees also experience using AWS services that support secure access using VPC endpoints. Builder Session Neeraj Verma
FND205 - IAM at enterprise scale: Patterns and tradeoffs In order to balance developer productivity and security goals, like the principle of least privilege, AWS recommends that enterprises implement a multi-account strategy using AWS Organizations, AWS Identity and Access Management (IAM) roles, and other related services. However, this presents operational challenges for identity and access management. In this chalk talk, we describe the key building blocks of an enterprise solution using IAM, and we compare four patterns for addressing this challenge: fine-grained, departmental, AWS centric, and native IAM. Chalk Talk Kenneth Jackson
FND206 - IAM permissions boundaries As organizations grow, administrators want to allow trusted employees to configure and manage IAM permissions so their organizations can scale permission management and move workloads to AWS faster. In this session, we introduce permissions boundaries—a powerful tool that controls the maximum permissions an employee can grant—and we demonstrate how to use them to delegate permissions to developers. We also help customers implement a use case for permissions boundaries and help them delegate permissions to their developers. Attendees should know how to create IAM permissions policies, users, and roles. Chalk Talk Dan Popick Sulay Shah
FND207 - Building a well-engaged and secure AWS account access management Building a well-managed and secure AWS account access management for enterprise customers and AWS partners is essential for managing a large number of AWS accounts. In this session, we review new features, best practices, and the risks involved when architecting organizational units. We also cover how to build dynamic access structures. Workshop Marcus Fritsche
FND208 - SOARing in AWS Is your organization struggling to keep up with the current threat landscape? Security operations rely primarily on manually created and maintained document-based procedures, which lead to issues such as long mean time to response, ancestral knowledge, and inconsistencies in executing operational functions. If these are your challenges, then you can use a Security Orchestration, Automation, and Response (SOAR) mechanism within AWS. In traditional environments, this required considerable investment, but on AWS, the same objectives are achieved in a cost-effective manner. This session allows you to explore and dive deep into AWS services that can enable SOAR in your AWS environment. Builder Session Farhan Farooq
FND209 - The fundamentals of AWS cloud security The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure is simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption. Session Becky Weiss
FND210 - Implementing your landing zone In this session, we discuss approaches to implementing and deploying a scalable landing zone structure. We present an overview of the AWS Landing Zone solution and AWS Control Tower, which is an automated solution for setting up a robust and flexible AWS environment that was designed based on the collective experience of AWS and our customers. These services help automate the setup of a flexible account structure, a security baseline, a network structure, and user access based on best practices. Future growth is facilitated by an account factory component that simplifies the creation of additional accounts. Session Sam Elmalak
FND211 - AWS VPN solutions Many enterprises, on their journey to the cloud, require consistent and highly secure connectivity among their existing data centers, their staff, and AWS environments. In this session, we walk through the different architecture options for establishing this connectivity using AWS Site-to-Site VPN and AWS Client VPN. For each option, we evaluate the considerations and discuss performance, high availability, encryption, and cost. Builder Session Tom Adamski Kaartik Viswanath
FND216 - Threat detection on AWS: An introduction to Amazon GuardDuty Amazon GuardDuty is a threat detection system that is reimagined and purpose-built for the cloud. Once enabled, GuardDuty immediately starts analyzing continuous streams of account and network activity in near real-time and at scale. You do not have to deploy or manage any additional security software, sensors, or network appliances. Threat intelligence is pre-integrated into the service and is continuously updated and maintained. This session introduces you to GuardDuty, walks you through the detection of an event, and discusses the various ways you can react and remediate. Session Holland Holland
FND217 - It’s in my backlog: The truth behind DevSecOps The term DevSecOps has often been confused with securing DevOps, with security operations, or with using a secure development lifecycle in agile development. When you build security into DevOps and even into agile development, when do practices such as threat modeling, static application security testing, and dynamic application security testing occur? This session explains how sound architecture and implementation is key to providing DevSecOps capability with AWS. A core concept is that cybersecurity requirements are foundational and cannot be placed on a backlog indefinitely while development and operations are actively worked on. Session
FND218 - Prioritize your security alerts and automate compliance with Security Hub Learn about AWS Security Hub and how it gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. See how Security Hub aggregates, organizes, and prioritizes your alerts or findings from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie, as well as from AWS Partner solutions. Session Ely Kahn
Get More Results