Re:Invent – New security sessions soon launching

Month go where did the final? Were you in a position to catch every one of the sessions in the Security, Identity, and Compliance track you hoped to see at AWS re:Invent? If you missed any, don’t worry-you can stream all of the sessions released in 2020 via the AWS re:Invent website. Additionally, january 12-15 we’re starting 2021 with new sessions you could stream live. Listed below are the new Security, Identity, and Compliance sessions-each session emerges at multiple times, in order to find the appropriate time that is most effective for the location and schedule.

Protecting sensitive data with Amazon Macie and Amazon GuardDuty – SEC210
Himanshu Verma, AWS Speaker

Tuesday, January 12 – 11:00 AM to 11:30 AM PST
Tuesday, January 12 – 7:00 PM to 7:30 PM PST
Wednesday, January 13 – 3:00 AM to 3:30 AM PST

As organizations manage growing volumes of data, identifying and protecting your sensitive data may become complex increasingly, expensive, and time-consuming. In this session, understand how Amazon Macie and Amazon GuardDuty provide protection for the data stored in Amazon S3 together. Amazon Macie automates the discovery of sensitive data at scale and lowers the expense of protecting your data. Amazon GuardDuty continuously profiles and monitors S3 data access events and configurations to detect suspicious activities. Come find out about these security services and how exactly to best utilize them for protecting data in your environment.

BBC: Driving security guidelines in a decentralized organization – SEC211
Apurv Awasthi, AWS Speaker
Andrew Carlson, Sr. Software Engineer – BBC

Tuesday, January 12 – 1:15 PM to at least one 1:45 PM PST
Tuesday, January 12 – 9:15 PM to 9:45 PM PST
Wednesday, January 13 – 5:15 AM to 5:45 AM PST

In this session, Andrew Carlson, engineer at BBC, discusses BBC’s journey while adopting AWS Secrets Manager for lifecycle management of its arbitrary credentials such as for example database passwords, API keys, and third-party keys. He provides insight on BBC’s secrets management guidelines and the way the company drives these at enterprise scale in a decentralized environment which has a highly visible scope of impact.

Get prior to the curve with DDoS Response Team escalations – SEC321
Fola Bolodeoku, AWS Speaker

Tuesday, January 12 – 3:30 PM to 4:00 PM PST
Tuesday, January 12 – 11:30 PM to 12:00 AM PST
Wednesday, January – 7:30 AM to 8:00 AM PST

This session identifies tricks and tools which you can use to get ready for application security escalations, with lessons learned supplied by the AWS DDoS Response Team. You understand how AWS customers purchased different AWS offerings to safeguard their applications, including network access control lists, security groups, and AWS WAF. Additionally you learn to avoid common misconfigurations and mishaps observed by the DDoS Response Team, and you also discover simple yet effective actions you could try better protect your applications’ availability and security controls.

Network security for serverless workloads – SEC322
Alex Tomic, AWS Speaker

Thursday, January 14 -1:30 PM to 2:00 PM PST
Thursday, January 14 – 9:30 PM to 10:00 PM PST
Friday, January 15 – 5:30 AM to 6:00 AM PST

Are you creating a serverless application using services like Amazon API Gateway, AWS Lambda, Amazon DynamoDB, Amazon Aurora, and Amazon SQS? Do you want to apply enterprise network security to these AWS services? This session covers how network security concepts like encryption, firewalls, and traffic monitoring could be put on a well-architected AWS serverless architecture.

Building your cloud incident response program – SEC323
Freddy Kasprzykowski, AWS Speaker

Wednesday, January 13 – 9:00 AM to 9:30 AM PST
Wednesday, January 13 – 5:00 PM to 5:30 PM PST
Thursday, January 14 – 1:00 AM to at least one 1:30 AM PST

You’ve configured your detection services and today you’ve received your first alert. This session provides patterns that assist you to understand what capabilities you will need to create and run a highly effective incident response program in the cloud. It offers overview of some logs to see what they let you know and a discussion of tools to investigate those logs. You learn to ensure that your team gets the right access, how automation might help, and which incident response frameworks can show you.

Beyond authentication: Guide to secure Amazon Cognito applications – SEC324
Mahmoud Matouk, AWS Speaker

Wednesday, January 13 – 2:15 PM to 2:45 PM PST
Wednesday, January 13 – 10:15 PM to 10:45 PM PST
Thursday, January 14 – 6:15 AM to 6:45 AM PST

Amazon Cognito is really a flexible user directory that may meet up with the needs of several customer identity management use cases. Web and mobile applications can integrate with Amazon Cognito in minutes to provide user authentication and obtain standard tokens to be utilized in token-based authorization scenarios. This session covers guidelines you could implement in the application to secure and protect tokens. Additionally you find out about new Amazon Cognito features that provide you more options to boost the security and option of your application.

Event-driven data security using Amazon Macie – SEC325
Neha Joshi, AWS Speaker

Thursday, January 14 – 8:00 AM to 8:30 AM PST
Thursday, January 14 – 4:00 PM to 4:30 PM PST
Friday, January 15 – 12:00 AM to 12:30 AM PST

Amazon Macie sensitive data discovery jobs for Amazon S3 buckets assist you to discover sensitive data such as for example personally identifiable information (PII), financial information, account credentials, and workload-specific sensitive information. In this session, you find out about an automated method of discover sensitive information whenever changes are created to the objects in your S3 buckets.

Instance containment approaches for effective incident response – SEC327
Jonathon Poling, AWS Speaker

Thursday, January 14 – 10:15 AM to 10:45 AM PST
Thursday, January 14 – 6:15 PM to 6:45 PM PST
Friday, January 15 – 2:15 AM to 2:45 AM PST

In this session, find out about several instance isolation and containment techniques, which range from effective and easy to more technical and powerful, that leverage native AWS networking services and account configuration techniques. If an incident happens, you might have questions like “Just how do we isolate the operational system while preserving all of the valuable artifacts?” and “What options do we have even?”. They are valid questions, but you can find more important ones to go over amidst a (possible) incident. Join this session to understand impressive instance containment techniques in a crawl-walk-run approach that also facilitates preservation and assortment of valuable artifacts and intelligence.

Trusted connects for government workloads – SEC402
Brad Dispensa, AWS Speaker

Wednesday, January 13 – 11:15 AM to 11:45 AM PST
Wednesday, January 13 – 7:15 PM to 7:45 PM PST
Thursday, January 14 – 3:15 AM to 3:45 AM PST

Cloud adoption over the public sector is rendering it simpler to provide government workforces with seamless usage of applications and data. With this particular proceed to the cloud, we are in need of updated security guidance to make sure public-sector data remain secure also. For instance, the TIC (Trusted ONLINE CONNECTIONS) initiative is a requirement of US federal agencies for quite a while. The recent TIC-3 moves from prescriptive guidance to an outcomes-based model. This session walks you through how exactly to leverage AWS features to raised protect public-sector data using TIC-3 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). Also, understand how this may map into other geographies.

I anticipate seeing you in these sessions. Please start to see the re:Invent agenda for additional information also to build your schedule.

When you have feedback concerning this post, submit comments in the Comments section below.

Want more AWS Security how-to content, news, and show announcements? Follow us on Twitter.

%d bloggers like this: