Tag: Videos

Fraud Detection Using Machine Learning with Amazon SageMaker – AWS Online Tech Talks

Fraud Detection Using Machine Learning with Amazon SageMaker – AWS Online Tech Talks

Fraud Detection Using Machine Learning with Amazon SageMaker – AWS Online Tech Talks
**Learn about building a solution using machine learning with Amazon SageMaker to detect fraud **Learn how Amazon SageMaker along with other relevant AWS services can help you build a technical solution to address fraud **Learn about using the strengths of machine learning with Amazon SageMaker to detect and potentially avoid fraud for your business

View on YouTube

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)

AWS re:Inforce 2019: Root CA Hierarchies for AWS Certificate Manager (ACM) Private CA (FND320)
AWS recently announced root certificate authority (CA) hierarchies for AWS Certificate Manager (ACM) Private CA. CA administrators can now quickly and easily create a complete CA hierarchy, including root and subordinate CAs, with no need for external CAs. In this presentation, we provide an overview of ACM Private CA and discuss some common use cases, such as issuing private certificates in order to identify devices. You learn how to create a two-level CA hierarchy and use it to issue private certificates. You also learn security best practices for creating and managing a CA hierarchy, and you have a chance to ask questions.

View on YouTube

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)

AWS re:Inforce 2019: Balancing Cloud Innovation and Security (GRC317)
In an accreditation system, it’s critical to balance the needs for cloud service provider (CSP) security assurance and ensuring an efficient path towards cloud adoption and use. In this session, we share best practices from observing and learning from our participation in a number of government CSP accreditation programs. Information from this session benefits decision makers and cloud users in gaining a broad knowledge of the global CSP accreditation systems that are in operation today. Attendees also gain a deeper understanding of their respective strengths and opportunities for excellence, in addition to how to apply them in their own cloud journey.

View on YouTube

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)

AWS re:Inforce 2019: A Security-First Approach to Delivering End-User Computing Services (FND327)
Enterprise customers in regulated industries often struggle to meet security and data sovereignty requirements for desktop applications and mobile workers. End-user devices present the challenge of risky endpoints, making critical data vulnerable to attack, loss, or theft. With AWS, you can improve security and compliance by centrally managing endpoints within your VPC without the cost and complexity of on-premises solutions. AWS makes data delivered on end-user devices ephemeral so that employees can access internal applications from personal devices without a local trusted network. Learn how AWS improves security and reduces cost by moving data to the cloud while providing secure, fast access to desktop applications and data.

 

 

Presenter(s):
– Ron Bledsoe, Bridgewater

View on YouTube

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)

AWS re:Inforce 2019: Protect Customer Privacy with AWS (GRC351)
Come to this session to learn a new approach for reducing risk and costs while increasing productivity, organizational alacrity, and customer experience, resulting in a competitive advantage and assorted revenue growth. We share how a de-identified data lake on AWS can help you comply with General Data Protection Regulation and California Consumer Privacy Act requirements.

Presenter(s):
– Anhad Singh, Dataguise Inc.

View on YouTube

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)

AWS re:Inforce 2019: Tax Returns in the Cloud: The Journey of Intuit’s Data Platform (SDD330)
With Amazon EC2, Amazon EBS, Amazon S3, AWS KMS, and more, Intuit’s data platform was able meet the requirements of high availability and rapid infrastructure scaling for 100 percent of the tax year’s seasonal demands. In this session, Intuit answers questions such as: Which portions of a complex system can be forklifted directly? Which need to be reengineered? How can highly sensitive data be migrated and stored securely in AWS? Are operational best practices in AWS different than those on premises? Intuit shares its strategy for establishing sufficient confidence in your business partners and delivering 100 percent product uptime.

Presenter(s):
– Ben Covi, Intuit
– Amit Matety, Intuit

View on YouTube

Gain Control Over Your License Usage and Reduce Costs Using AWS License Manager

Gain Control Over Your License Usage and Reduce Costs Using AWS License Manager

Gain Control Over Your License Usage and Reduce Costs Using AWS License Manager
**Learn how to configure licensing rules and track different types of licenses across multiple AWS accounts **Understand best practices to attach license configurations to instances running on premises for central management of licenses **Learn how to use AWS License Manager for easier licensing true-ups and audits

View on YouTube

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)

AWS re:Inforce 2019: Integrating Network and API Security into Your Application Lifecycle (DEM07)
In this session, we discuss the contention between traditional network security practices and the agile development processes typically associated with cloud computing. We also introduce new approaches used by Fortinet customers that help cloud teams and security teams share a common language and secure their business more effectively—without introducing additional friction and operational overhead.

Presenter(s):
– Lior Cohen, Fortinet

View on YouTube

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)

AWS re:Inforce 2019: Securing Enterprise-Grade Serverless Applications (SDD401)
Serverless is one of the most popular innovations in the cloud today. Join this session to learn how to secure enterprise-grade serverless applications. We cover the strategies you can use to build secure applications running on AWS Lambda and Amazon API Gateway. Then we review how you can audit and monitor your applications using tools like AWS Config and AWS X-Ray. Join us to see examples and learn best practices from AWS serverless experts.

View on YouTube