Return
Continue
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Reserved - Scan in at least 10 minutes before the beginning of the session.
This has been added to your Planner. Please note: This is not a reserved seat.
Waitlisted - you may be assigned a reserved seat if one becomes available.

Please be sure to check the session detail of this session for a full list of repeat sessions.

Personal Calendar
 
Conference Event
Meeting
Interests
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
Meeting Summary

I'm interested in this
I'm no longer interested
 

BTC002-R - [REPEAT] Building Serverless Compliance-as-code Compliance-as-code is the concept of automating the evaluation of recorded configurations against desired configurations, from a security and well-architected perspective. Building Serverless Compliance-as-code is a half-day, advanced-level course designed to teach you how to use, read, and write compliance-as-code to keep an AWS environment secure and optimized. The course will conclude with a hands-on Capture the Flag tournament. The goal is to build innovative compliance-as-code to be made available to millions of AWS customers on the AWS public Github. Bootcamp
BTC002-R1 - [REPEAT 1] Building Serverless Compliance-as-code Compliance-as-code is the concept of automating the evaluation of recorded configurations against desired configurations, from a security and well-architected perspective. Building Serverless Compliance-as-code is a half-day, advanced-level course designed to teach you how to use, read, and write compliance-as-code to keep an AWS environment secure and optimized. The course will conclude with a hands-on Capture the Flag tournament. The goal is to build innovative compliance-as-code to be made available to millions of AWS customers on the AWS public Github. Bootcamp
BTC006 - AWS Certification Exam Readiness: Security - Specialty The AWS Certified Security - Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, advanced-level course to learn how to prepare and succeed in the exam. We will help you prepare for the exam by exploring the exam’s domain areas and mapping them to specific areas to study. We will review sample exam questions in each domain area, teaching you how to interpret the concepts being tested so that you can better eliminate incorrect responses. Bootcamp
BUF001-R - [REPEAT] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF001-R1 - [REPEAT 1] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF001-R2 - [REPEAT 2] Build Your Own Security Chaos Testing on AWS Despite spending more on security, data breaches are continuously getting bigger and more frequent across all industries. In fact, a large portion of data breaches are caused not by sophisticated nation-state actors or hacktivists, but rather simple things rooted in human error and system glitches. We will provide a simplified game day to build security chaos testing, based on the most prominent open source chaos tool, to perform a number of pre-defined “security chaos experiments” on AWS. The attendee will learn what is Chaos Engineering, how to design and implement his own security chaos testing on AWS. Builders Fair
BUF002-R - [REPEAT] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF002-R1 - [REPEAT 1] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF002-R2 - [REPEAT 2] Security Hub Finding Enrichment Service Quickly understanding the context and clues is critical when successfully responding to a security incident. AWS Security Hub reduces the effort of collecting and prioritizing security findings. In this Builder’s Fair demo, we show finding notifications delivered to an Amazon Chime security chat operations channel with additional context about the target EC2 Instance. Providing log data, network statistics, and vulnerability information accelerates the receiving analyst’s time to resolution. Providing URL links, relevant to the incident, allow the security analyst to focus on the appropriate next steps. Builders Fair
BUF003-R - [REPEAT] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF003-R1 - [REPEAT 1] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF003-R2 - [REPEAT 2] Protecting and Anonymizing PHI/PII data with AWS In this session, we demonstrate how AWS protects and anonymizes personal health information (PHI) and personally identifiable information (PII) data received from medical facilities (e.g., medical clinics, doctor’s offices, and laboratories). We show you how external data sources are legitimate using API Gateway, AWS WAF, and GuardDuty. We protect and anonymize PHI and PII data using Lake Formation, AWS Glue, Amazon Comprehend Medical, and Macie to ensure data privacy, data classification, and regulatory compliance. This demonstration can be shared with healthcare providers, healthcare partners, and the open source community. Builders Fair
BUF004-R - [REPEAT] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF004-R1 - [REPEAT 1] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF004-R2 - [REPEAT 2] Security @ AWS with PPE Detection We can apply AWS security solutions to the manufacturing world and create better physical environments for workers all around the world. This serves as health safety purposes as well as a competitive advantage for our clients, once they can minimize administrative processes and reduce cost on labor indemnity. This demo will demonstrate how a camera can be used to detect Personal Protective Equipment (PPE) in real-time and help to prevent injuries in the workplace. Workers without protective equipment will receive a “You are not safe” audio message, at the same time that their supervisors will be notified via email or SMS. Additionally, this demo will show a QuickSight dashboard with real-time statistics on the number of people and equipment detected. Builders Fair
BUF005-R - [REPEAT] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF005-R1 - [REPEAT 1] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF005-R2 - [REPEAT 2] Detect Social Engineering While It Happens In this session we will show how a potential social engineering attack is detected. As an attendee you can place a call and when you utter certain phrases, the receiver of the call is notified, via SMS, they could be under a social engineering attack. The phone number is added to a list and blocked from calling in the future. Builders Fair
BUF006-R - [REPEAT] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF006-R1 - [REPEAT 1] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF006-R2 - [REPEAT 2] Augmented Face Recognition with Life Detection for User Authentication Traditional authentication mechanisms involving face recognition cannot usually distinguish between real faces and photos. In this project we demonstrate an augmented face recognition mechanism, where we combine traditional visual recognition approaches with an additional test to prevent impersonations using a face photo. Our augmented approach consists of asking the user to read a random word pattern and then contrast the lip movements with the requested pattern, while checking that lip movements come from the same face. This authentication mechanism can be applied for fraud prevention and detection in ATMs, booths and other portable devices (e.g., mobile apps). Builders Fair
BUF007-R - [REPEAT] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF007-R1 - [REPEAT 1] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF007-R2 - [REPEAT 2] WOPR: WAF Operations Play Room The gamified demonstration brings out the complex, time consuming, error prone nature of crafting WAF mitigations when your Web Application is under attack. Join the game and see how fast you can mitigate a simulated web application attack. Can you block a brute force attack or bot activity? Step right up and see how quick you can stop the badness. Builders Fair
BUF008-R - [REPEAT] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
BUF008-R1 - [REPEAT 1] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
BUF008-R2 - [REPEAT 2] Securing Alexa skills with 2 Factor Authentication and Alexa for Business With a voice first design strategy, many organizations are building voice-enabled solutions using Alexa. These solutions range from mission critical operations, reporting company's KPIs to increasing worker productivity. Securing Alexa skills is a paramount need and customers are looking for options to secure Alexa Skills. We Will demonstrate how to secure Alexa Skills by deploying them as Private Skills (using Alexa for Business) and implementing 2 factor authentication using a 6 Digit Security PIN sent to enrolled Skill users via SMS and by performing Facial Recognition using AWS Recognition with Amazon Cognito. Builders Fair
CTC001 - Cradles to Crayon Join AWS in supporting Cradles to Crayons. The nonprofit provides children from birth through age 12 living in homeless or low-income situations and struggling with Clothing Insecurity with the essential items they need to thrive—at home, at school, and at play. At AWS re:Inforce, we will be working with Cradles to Crayons on a program that provides Hygiene Care Kits to those children between the ages of 10-12 in Massachusetts. Get involved by putting together a Hygiene Care Kit or two on Wednesday, June 26th from 7:00AM-11:00AM: Level 1, North Lobby. General Activity
CTF001-R - [REPEAT] Capture the flag There are two parts of this event that run simultaneously: a traditional Jeopardy-style part and a Castle Defense part. The Jeopardy style-part allows you to work at your own pace through a number of security challenges to identify a specific answer (flag). There are challenges that revolve around mobile apps, quantum physics, exploits, data processing, and, of course, AWS services. During the Castle Defense part, you get a production workload that you need to harden and protect against a number of security events that occur within your environment. The winner will have the top combined score of both parts. You can work on both parts during breaks, lunch, or overnight. General Activity
CTF001-R1 - [REPEAT 1] Capture the flag There are two parts of this event that run simultaneously: a traditional Jeopardy-style part and a Castle Defense part. The Jeopardy style-part allows you to work at your own pace through a number of security challenges to identify a specific answer (flag). There are challenges that revolve around mobile apps, quantum physics, exploits, data processing, and, of course, AWS services. During the Castle Defense part, you get a production workload that you need to harden and protect against a number of security events that occur within your environment. The winner will have the top combined score of both parts. You can work on both parts during breaks, lunch, or overnight. General Activity
DEM01-R - [REPEAT] Build anywhere; Secure everywhere Developers want to build quickly and deliver powerful application experiences to every user. In this session, we show how you can enable agile development while securing your entire application footprint. Akamai’s intelligent edge security solutions surround and extend your entire architecture for a single policy that’s adaptive, integrated, and consistently secure. Combine that with the power of AWS, and you have a total edge ecosystem that’s unparalleled in its ability to deliver and protect amazing experiences everywhere. Don’t just build—build better with Akamai. Demo Session Ari Weil
DEM01-R1 - [REPEAT 1] Build anywhere; Secure everywhere Developers want to build quickly and deliver powerful application experiences to every user. In this session, we show how you can enable agile development while securing your entire application footprint. Akamai’s intelligent edge security solutions surround and extend your entire architecture for a single policy that’s adaptive, integrated, and consistently secure. Combine that with the power of AWS, and you have a total edge ecosystem that’s unparalleled in its ability to deliver and protect amazing experiences everywhere. Don’t just build—build better with Akamai. Demo Session Ari Weil
DEM02-R - [REPEAT] Accelerated Threat Detection: Alert Logic and AWS Over the last 7 years, Alert Logic has helped AWS customers achieve enhanced security and peace of mind. Learn how positive security outcomes are attained by combining human expertise and the latest in AWS security in this engaging session with Jack Danahy, SVP of Security at Alert Logic, and Zach Vinduska, VP of IT Infrastructure and Security at ClubCorp. Hear real-world examples of how expert defenders in Alert Logic’s 24/7 Security Operations Center can help you quickly detect threats, verify them as incidents, and support you in responding quickly and effectively. Demo Session Jack Danahy Zach Vinduska
DEM02-R1 - [REPEAT 1] Accelerated threat detection: Alert Logic and AWS Over the last seven years, Alert Logic has helped AWS customers achieve enhanced security and peace of mind. Learn how positive security outcomes are attained by combining human expertise and the latest in AWS security in this engaging session with Jack Danahy, SVP of security at Alert Logic, and Zach Vinduska, VP of IT infrastructure, security, and compliance at ClubCorp. Hear real-world examples of how expert defenders in Alert Logic’s 24/7 security operations center can help you quickly detect threats, verify them as incidents, and respond swiftly and effectively. Demo Session Jack Danahy Zach Vinduska
DEM03-R - [REPEAT] How to Leverage Traffic Analysis to Navigate through Cloudy Skies How do you establish and maintain consistent security and governance across your dynamic AWS environments, with visibility and control of your security posture? Zohar Alon, Head of Cloud Product Line at Check Point and former CEO of Dome9, discusses security best practices as you scale across VPCs, accounts and regions. He covers considerations and recommendations for network, control plane and identities when building your cloud security strategy. Understand how security orchestration and active protection tools secure your cloud journey. Discover new ways to leverage traffic analysis for security intelligence, threat detection and auto-remediation. Demo Session Zohar Alon
DEM03-R1 - [REPEAT 1] How to leverage traffic analysis to navigate through cloudy skies How do you establish and maintain consistent security and governance across your dynamic AWS environments with visibility and control of your security posture? Zohar Alon, head of cloud product line at Check Point and former CEO of Dome9, discusses security best practices for scaling across virtual private clouds (VPCs), accounts, and regions. He covers considerations and recommendations for networks, control planes, and identities when building your cloud security strategy. In this session, learn how security orchestration and active protection tools secure your cloud journey. Discover new ways to leverage traffic analysis for security intelligence, threat detection, and auto-remediation. Demo Session Zohar Alon
DEM04-R - [REPEAT] Best practices for privileged access & secrets management in the cloud In this session, you learn from real-world scenarios related to privileged access security in cloud environments. Experts from TOTVS and CyberArk provide insights from lessons learned while securing commercial SaaS applications, cloud infrastructure, and internal applications deployed in the cloud. Topics covered include privilege and cloud scenarios (e.g., human access models, support for automation, proactive controls, and programmatic deployment), as well as best practices and augmentation of existing security controls for privilege and secrets management on the AWS Cloud. We also cover limited use of root accounts, considerations for human administrator access in the cloud, and success with hybrid cloud environments. Demo Session Leandro Soares Costa Brandon Traffanstedt
DEM04-R1 - [REPEAT 1] Best practices for privileged access & secrets management in the cloud  In this session, you learn from real-world scenarios related to privileged access security in cloud environments. Experts from TOTVS and CyberArk provide insights from lessons learned while securing commercial SaaS applications, cloud infrastructure, and internal applications deployed in the cloud. Topics covered include privilege and cloud scenarios (e.g., human access models, support for automation, proactive controls, and programmatic deployment), as well as best practices and augmentation of existing security controls for privilege and secrets management on the AWS Cloud. We also cover limited use of root accounts, considerations for human administrator access in the cloud, and success with hybrid cloud environments. Demo Session Brandon Traffanstedt Leandro Soares Costa
DEM05-R - [REPEAT] Shifting everywhere: Security and the cloud at 3M in the ’20s The cloud has been a topic of interest and excitement for more than a decade, but many organizations are still trying to figure out how to balance security with the freedom to use the cloud to innovate. Jason Pryor, cloud security engineering manager for 3M, shares how he is approaching cloud security at 3M today and where he believes that cloud security needs to go as we enter a new decade. Come hear how security has to adapt in the cloud era to support new business rules everywhere. Demo Session Jason Pryor
DEM05-R1 - [REPEAT 1] Shifting Everywhere: Security and Cloud at 3M in the ’20s Cloud has been the talk of the town for more than a decade, but many organizations are still trying to figure out how to balance security with the freedom to use the cloud to innovate. Jason Pryor, Cloud Security Engineering Manager for 3M, shares how he is approaching cloud security at 3M today, and where he believes cloud security needs to go as we enter a new decade. Come hear how security has to adapt in the cloud era to support new business rules everywhere. Demo Session Jason Pryor
DEM06 - Making application threat intelligence practical The daily volume of cyberattacks that target applications and the frequency of associated breaches is overwhelming to even the most experienced security professionals. We cover important lessons learned from F5 Labs’ analysis of global attack data and breach root causes that are attributed to application threats. This helps you understand attackers’ top targets and motives and the changing application security landscape of systems used to launch application attacks. Addressing these threats requires practical controls that organizations can be successful with. We offer tips and tricks that you can work on immediately to address common application threats and appropriately prioritize your application security controls. Demo Session Preston Hogue
DEM07 - Integrating network and API security into your application lifecycle In this session, we discuss the contention between traditional network security practices and the agile development processes typically associated with cloud computing. We also introduce new approaches used by Fortinet customers that help cloud teams and security teams share a common language and secure their business more effectively—without introducing additional friction and operational overhead. Demo Session Lior Cohen
DEM08 - Build security into your golden AMI pipeline In agile and elastic environments, having real-time visibility into instances and ensuring that they are secure and compliant is critical. Solutions must work with your DevOps tools to provide visibility without slowing down your release cadence. In this session, Qualys shares how you can implement an AWS golden AMI pipeline that is integrated with Qualys to assess your AMIs and monitor the instances for changes in production. Learn how Ancestry uses Qualys in its CI/CD pipeline to secure its applications and track-approved AMIs. Using Qualys, Ancestry was able to reduce the vulnerabilities in its application deployments by 80 percent in a few months. Demo Session Hari Srinivasan
DEM09 - Monitoring and administrating privileged access in the cloud A key security consideration for the enterprise is monitoring and administrating privileged access for business-critical applications that are running on the AWS Cloud. Join Saviynt in this session and learn how to request, fulfill, certify, and govern privileged assets in the cloud with Saviynt’s Cloud privileged access management (PAM) solution. Saviynt covers best practices and the benefits of securing privileged access in the cloud, ranging from the AWS Management Console to elastic workloads. This session helps you understand why privileged access is a cornerstone of best practices and compliance for cloud security. Demo Session Nabeel Nizar
DEM10 - Keep That Silver Lining Inside Your Cloud Cloud is here, and AWS is leading the charge in enabling customers to migrate their data centers and data to the cloud. With these changing needs, enterprises need a proactive, automated approach to monitoring and securing the cloud infrastructure. During this session, learn how a major financial institution made a smooth transition to the AWS Cloud and their journey in securing their IaaS infrastructure starting from visibility, protecting their workloads, data, and users, and at the same time staying compliant to PCI-DSS and SOC2. AWS services working in tandem with Symantec solutions make this automation and continuous protection possible. Demo Session Anand Visvanathan
DEM11-R - [REPEAT] Pragmatic container security Containers accelerate development and address the challenges of application packaging and delivery. Thanks to containers, teams can quickly and reliably deploy their applications. But solutions always come with a cost. Containers simplify the developer experience by pushing complexity down into the infrastructure. This shift requires a change in the security approach in order to preserve the advantages that containers bring. In this talk, we use practical examples to understand the security strategy using the AWS shared responsibility model, and we cover tactics that you need to continue accelerating development while meeting your container deployment security goals on AWS. Demo Session Jeff Westphal
DEM11-R1 - [REPEAT 1] Pragmatic Container Security Containers accelerate development. They address the challenge of application packaging and delivery. Thanks to containers, teams can quickly and reliably deploy their applications. But solutions always come with a cost. Containers simplify the developer experience by pushing complexity down into the infrastructure. This shift requires a change in the security approach in order to preserve the advantages containers bring. In this talk, we use practical examples to understand the security strategy, using the AWS Shared Responsibility Model, and cover tactics you need to continue to accelerate development while meeting your container deployment security goals on AWS. Demo Session Jeff Westphal
DEM12-R - [REPEAT] Governance for the Cloud Age In this session, we define cloud governance and explain its role in achieving security, compliance, and architecture best practices. Using real-world case studies from Fortune 100 enterprises, we demonstrate how governance automation is being used to accelerate the migration and ongoing operations of hundreds of enterprise applications, all while increasing visibility and control for the enterprise. Demo Session Nathan Wallace
DEM12-R1 - [REPEAT 1] Governance for the cloud age In this session, we define cloud governance and explain its role in achieving security, compliance, and architecture best practices. Using real-world case studies from Fortune 100 enterprises, we demonstrate how governance automation is being used to accelerate the migration and ongoing operations of hundreds of enterprise applications. We also explain how this is achieved while increasing visibility and control for the enterprise. Demo Session Nathan Wallace
DEM13 - Modernizing Traditional Security As containers become the commonplace method for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, John Morello from Twistlock discusses a non-profit that provides environmental science and engineering oversight to some of the world’s largest civil waterworks projects. This organization relies on a critical 14-year-old app that models storm surge. The move to containers for this application delivered immediate benefits, making it easier to manage vulnerabilities, ensure regulatory compliance, and provide runtime defense. In this session, we break down the security advantages of containers relative to traditional architectures. Demo Session John Morello
Get More Results