Tag: Amazon Web Services

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)
AWS recently announced root certificate authority (CA) hierarchies for AWS Certificate Manager (ACM) Private CA. CA administrators can now quickly and easily create a complete CA hierarchy, including root and subordinate CAs, with no need for external CAs. In this presentation, we provide an overview of ACM Private CA and discuss some common use cases, such as issuing private certificates in order to identify devices. You learn how to create a two-level CA hierarchy and use it to issue private certificates. You also learn security best practices for creating and managing a CA hierarchy, and you have a chance to ask questions.

View on YouTube

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)
In an accreditation system, it’s critical to balance the needs for cloud service provider (CSP) security assurance and ensuring an efficient path towards cloud adoption and use. In this session, we share best practices from observing and learning from our participation in a number of government CSP accreditation programs. Information from this session benefits decision makers and cloud users in gaining a broad knowledge of the global CSP accreditation systems that are in operation today. Attendees also gain a deeper understanding of their respective strengths and opportunities for excellence, in addition to how to apply them in their own cloud journey.

View on YouTube

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)
Enterprise customers in regulated industries often struggle to meet security and data sovereignty requirements for desktop applications and mobile workers. End-user devices present the challenge of risky endpoints, making critical data vulnerable to attack, loss, or theft. With AWS, you can improve security and compliance by centrally managing endpoints within your VPC without the cost and complexity of on-premises solutions. AWS makes data delivered on end-user devices ephemeral so that employees can access internal applications from personal devices without a local trusted network. Learn how AWS improves security and reduces cost by moving data to the cloud while providing secure, fast access to desktop applications and data.

 

 

Presenter(s):
– Ron Bledsoe, Bridgewater

View on YouTube

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)
Come to this session to learn a new approach for reducing risk and costs while increasing productivity, organizational alacrity, and customer experience, resulting in a competitive advantage and assorted revenue growth. We share how a de-identified data lake on AWS can help you comply with General Data Protection Regulation and California Consumer Privacy Act requirements.

Presenter(s):
– Anhad Singh, Dataguise Inc.

View on YouTube

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)
With Amazon EC2, Amazon EBS, Amazon S3, AWS KMS, and more, Intuit’s data platform was able meet the requirements of high availability and rapid infrastructure scaling for 100 percent of the tax year’s seasonal demands. In this session, Intuit answers questions such as: Which portions of a complex system can be forklifted directly? Which need to be reengineered? How can highly sensitive data be migrated and stored securely in AWS? Are operational best practices in AWS different than those on premises? Intuit shares its strategy for establishing sufficient confidence in your business partners and delivering 100 percent product uptime.

Presenter(s):
– Ben Covi, Intuit
– Amit Matety, Intuit

View on YouTube

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)
In this session, we discuss the contention between traditional network security practices and the agile development processes typically associated with cloud computing. We also introduce new approaches used by Fortinet customers that help cloud teams and security teams share a common language and secure their business more effectively—without introducing additional friction and operational overhead.

Presenter(s):
– Lior Cohen, Fortinet

View on YouTube

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)
Serverless is one of the most popular innovations in the cloud today. Join this session to learn how to secure enterprise-grade serverless applications. We cover the strategies you can use to build secure applications running on AWS Lambda and Amazon API Gateway. Then we review how you can audit and monitor your applications using tools like AWS Config and AWS X-Ray. Join us to see examples and learn best practices from AWS serverless experts.

View on YouTube

AWS re:Inforce 2019: Network Visibility into the Traffic Traversing Your AWS Infrastructure (SEP209)

AWS re:Inforce 2019: Network Visibility into the Traffic Traversing Your AWS Infrastructure (SEP209)

AWS re:Inforce 2019: Network Visibility into the Traffic Traversing Your AWS Infrastructure (SEP209)
Having visibility into the Amazon VPC infrastructure is a foundational element that any cloud administrator needs to maintain and operate an AWS infrastructure that is secure and functional. Visibility into your AWS infrastructure becomes increasingly important as it scales, because it gives you the ability to make key planning decisions and maintain security. This session is intended for anyone wanting to learn about network visibility on AWS, and it includes information about partners and real-life customer use cases. Come see how you, too, can gain insights into the network traffic that is traversing your AWS infrastructure.

View on YouTube

AWS re:Inforce 2019: Serverless AI-Powered Identity Management (SEP306-R1)

AWS re:Inforce 2019: Serverless AI-Powered Identity Management (SEP306-R1)

AWS re:Inforce 2019: Serverless AI-Powered Identity Management (SEP306-R1)
Organizations today spend large amounts of time and money staffing or outsourcing to IT support desks, which fulfill basic use cases, such as resetting passwords, unlocking accounts, and providing access to applications. However, it is costly to implement existing password and account self-service solutions. In this session, we show you how natural language interfaces, combined with AWS serverless technologies, can enable your organization to build cost-effective, self-service capabilities for users. We also explore how to use chatbots, our new Amazon Quantum Ledger Database, analytics, and other AWS services to offload some of the most frequent IAM-based calls to service centers.

View on YouTube

AWS re:Inforce 2019: Guarding the Guardian’s Guard: IBM Trusteer (SEP326)

AWS re:Inforce 2019: Guarding the Guardian’s Guard: IBM Trusteer (SEP326)

AWS re:Inforce 2019: Guarding the Guardian’s Guard: IBM Trusteer (SEP326)
Risk assessment associated with digital identity is at the core of any digital business transformation. Companies strive to provide their customers with the best possible service, but at the same time, they struggle with the challenges of digital identity risk. IBM Trusteer is a SaaS solution that is meeting the challenge head-on. In this talk, we present two stories. We look at some identity proofing techniques, and we also examine some of the tools and processes that are keeping Trusteer’s cloud safe and secure. This session also explores use cases involving IBM tools that are deployed in an AWS environment.

Presenter(s):
– Doron Ben-Ari, IBM Trusteer

View on YouTube