In this chalk talk, we cover a number of AWS services involved with threat detection and mitigation, and we walk through some real-world threat scenarios. We discuss the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Amazon Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector and, of course, Amazon GuardDuty. Come with your questions on threat detection on AWS.
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Amazon Web Services
This is a practical, demo-driven session where you learn best practice for protecting applications on AWS. We provide an overview of the threats on AWS, discuss why perimeter defense helps with these threats, and discuss some key techniques that use services
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfAmazon Web Services
In this session, we discuss several options for performing real-time extract, transform, and load (ETL) using Amazon Kinesis, AWS Lambda, AWS Glue, and Amazon S3. We provide an overview of the different options that have distinct advantages in building real-time ETL applications before loading a data lake or warehouse.
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
From data that analyzed millions of resources across hundreds of customers, we’ve learned that human configuration errors that might expose your AWS resources have become increasingly common. The potential impact to security can be significant, and it’s critical for everyone to play their part in managing the risks. However, it’s important to first understand what risks need managing. In this session, we describe the five most common errors that we have distilled from our experience with customers, and we share how to best avoid these errors and their potential impact.
Building IoT applications for a connected home - SVC206 - Santa Clara AWS SummitAmazon Web Services
IoT transformation begins at home, but how can you get started quickly? Voice is a natural interface to interact not just with the world around us, but also with physical assets and things, such as connected home devices, including lights, thermostats, or TVs. In this session, we discuss how you can connect and control devices in your home using AWS IoT services and the Alexa Skills Kit. By the end of the session, you'll have a set of best practices for how to build IoT products in the connected home.
Twelve-factor serverless applications - MAD302 - Santa Clara AWS SummitAmazon Web Services
The twelve-factor application model represents 12 best practices for building modern, cloud-native applications. With guidance on factors like configuration, deployment, runtime, and multiple-service communication, the twelve-factor model prescribes best practices that apply to everything from web applications to APIs to data processing applications. Although serverless computing and AWS Lambda have changed application development, the twelve-factor best practices remain relevant and applicable in a serverless world. In this talk, we apply the twelve-factor model to serverless application development with AWS Lambda and Amazon API Gateway, and we show you how these services enable you to build scalable, well-built, low-administration applications.
Build sophisticated forecasting & recommendation models - AIM204 - Santa Clar...Amazon Web Services
Accurate forecasting and personalization provides many opportunities. At Amazon, we’ve used our expertise to deliver Amazon Forecast and Amazon Personalize. Amazon Forecast provides you with forecasts produced by machine learning (ML) that are up to 50% more accurate than traditional methods. Amazon Personalize can create individualized recommendations for each of your customers. You don’t need ML to get started because both use sophisticated techniques to analyze your data, select the right algorithm, and automatically train a custom model that’s specific to your use case. Learn how to get started with these services and how AWS customers are using them today.
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Amazon Web Services
Traditional monolithic architectures are hard to scale. As an application's code base grows, it becomes too complex to update and maintain. Introducing new features, languages, frameworks, and technologies becomes hard, limiting innovation and new ideas. Within a microservices architecture, each application component runs as its own service and communicates with other services through a well-defined API. Microservices are built around business capabilities, and each service performs a single function. In this workshop, we show you how to run a simple monolithic application in a Docker container, deploy the same application as microservices, and switch traffic to the microservices without downtime.
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Amazon Web Services
This is a practical, demo-driven session where you learn best practice for protecting applications on AWS. We provide an overview of the threats on AWS, discuss why perimeter defense helps with these threats, and discuss some key techniques that use services
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfAmazon Web Services
In this session, we discuss several options for performing real-time extract, transform, and load (ETL) using Amazon Kinesis, AWS Lambda, AWS Glue, and Amazon S3. We provide an overview of the different options that have distinct advantages in building real-time ETL applications before loading a data lake or warehouse.
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
From data that analyzed millions of resources across hundreds of customers, we’ve learned that human configuration errors that might expose your AWS resources have become increasingly common. The potential impact to security can be significant, and it’s critical for everyone to play their part in managing the risks. However, it’s important to first understand what risks need managing. In this session, we describe the five most common errors that we have distilled from our experience with customers, and we share how to best avoid these errors and their potential impact.
Building IoT applications for a connected home - SVC206 - Santa Clara AWS SummitAmazon Web Services
IoT transformation begins at home, but how can you get started quickly? Voice is a natural interface to interact not just with the world around us, but also with physical assets and things, such as connected home devices, including lights, thermostats, or TVs. In this session, we discuss how you can connect and control devices in your home using AWS IoT services and the Alexa Skills Kit. By the end of the session, you'll have a set of best practices for how to build IoT products in the connected home.
Twelve-factor serverless applications - MAD302 - Santa Clara AWS SummitAmazon Web Services
The twelve-factor application model represents 12 best practices for building modern, cloud-native applications. With guidance on factors like configuration, deployment, runtime, and multiple-service communication, the twelve-factor model prescribes best practices that apply to everything from web applications to APIs to data processing applications. Although serverless computing and AWS Lambda have changed application development, the twelve-factor best practices remain relevant and applicable in a serverless world. In this talk, we apply the twelve-factor model to serverless application development with AWS Lambda and Amazon API Gateway, and we show you how these services enable you to build scalable, well-built, low-administration applications.
Build sophisticated forecasting & recommendation models - AIM204 - Santa Clar...Amazon Web Services
Accurate forecasting and personalization provides many opportunities. At Amazon, we’ve used our expertise to deliver Amazon Forecast and Amazon Personalize. Amazon Forecast provides you with forecasts produced by machine learning (ML) that are up to 50% more accurate than traditional methods. Amazon Personalize can create individualized recommendations for each of your customers. You don’t need ML to get started because both use sophisticated techniques to analyze your data, select the right algorithm, and automatically train a custom model that’s specific to your use case. Learn how to get started with these services and how AWS customers are using them today.
Mythical Mysfits - Monolith to microservices with Docker and Fargate - MAD305...Amazon Web Services
Traditional monolithic architectures are hard to scale. As an application's code base grows, it becomes too complex to update and maintain. Introducing new features, languages, frameworks, and technologies becomes hard, limiting innovation and new ideas. Within a microservices architecture, each application component runs as its own service and communicates with other services through a well-defined API. Microservices are built around business capabilities, and each service performs a single function. In this workshop, we show you how to run a simple monolithic application in a Docker container, deploy the same application as microservices, and switch traffic to the microservices without downtime.
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Add Intelligence to Applications - AIM203 - Anaheim AWS SummitAmazon Web Services
AI has already been integrated into many use cases, but we’ve just scratched the surface of what’s possible. In this session, we cover how to use the AWS AI services to tackle three use cases that can deliver immediate value: 1) “voice of the customer” analytics to better understand what your customers are thinking and saying, 2) document analysis and processing to move beyond the limitations of traditional OCR, and 3) chatbots to improve in-app customer service and customer contact center experiences. We also discuss how to use AI in use cases within the Media, Healthcare, and Financial Services industries.
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools that can be used to deploy AWS infrastructure (as code), add the VM-Series to help protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub findings (operations as code). A brief demonstration concludes this session.
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Amazon Web Services
In this chalk talk, where we discuss a number of AWS services involved with threat detection and remediation. We walk through some real-world threat scenarios and provide recommendations on how to approach threat detection on AWS. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and, of course, GuardDuty.
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Amazon Web Services
The rapid adoption of cloud services and application migration has brought several challenges to network admins and security professionals, and it has made real-time visibility of the network an even more crucial priority. In this session, learn how Cisco Stealthwatch Cloud helps you leverage data you inherently create with AWS and within your network to prevent compute theft and orphaned compute, secure weak or incomplete access control lists (ACL), and enforce security policies beyond the traditional firewall while maintaining regulatory compliance by extending visibility across your entire network. This presentation is brought to you by AWS partner, Cisco Systems, Inc.
Cost efficiencies and security best practices with Amazon S3 storage - STG301...Amazon Web Services
Join us to learn best practices for Amazon S3 cost optimization and security. Amazon S3 supports various storage classes to help you cost-effectively store data. In this session, Amazon S3 experts discuss these storage classes, their key features, and the use cases that they support. We examine the newest storage classes, S3 Intelligent-Tiering and S3 Glacier Deep Archive. Learn about Amazon S3 access control policies, encryption, and security monitoring. Also, learn how to use S3 Block Public Access, a feature that helps you enforce a no public access policy for an individual bucket, a group of buckets, or an entire account.
Building enterprise solutions with blockchain and ledger technology - SVC202 ...Amazon Web Services
Blockchain technology is evolving rapidly. Are you ready to take advantage of blockchain’s use cases for the enterprise? In this session, learn how AWS views blockchain and ledger technology, get introduced to our services, and watch a demo of our new managed blockchain service, Amazon Managed Blockchain, which makes it easy to build and manage scalable Hyperledger Fabric networks on AWS.
Amazon digital user engagement solutions - SVC221 - New York AWS SummitAmazon Web Services
In this session, we describe how AWS provides the Amazon customer-centric culture of innovation, key technology building blocks, and a user engagement platform to help companies better engage their users. You also learn how Disney’s streaming service is utilizing the Amazon approach to engage its users. The intended audience for this session includes developers and business professionals who are responsible for digitally transforming their company.
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitAmazon Web Services
Encryption is an essential tool for protecting data, and your key management practices provide the means to control access to sensitive and regulated information. In this session, we provide an overview of AWS Key Management Service (AWS KMS) and show you how it integrates with encryption capabilities across AWS. We describe how customers can use AWS KMS features to gain additional control over their keys and satisfy compliance requirements. Representatives from Slack join us to describe how the company used AWS KMS to give its customers increased control and visibility over the data that Slack protects on their behalf.
Discuss data migration with AWS experts - STG304 - Santa Clara AWS SummitAmazon Web Services
AWS offers a variety of data migration services and tools to help you move everything from gigabytes to petabytes of data using your networks, our networks, the mail, or even a tractor-trailer. We briefly cover a few key data migration services, including the AWS Snow family and AWS DataSync. We then engage in an interactive discussion about specific customer use cases to help you understand which technology is best for your needs. Come and join the discussion.
Using ML to detect and prevent fraud without compromising user experience - F...Amazon Web Services
Based on NuData Security’s experience analyzing internet traffic, the company estimates that more than half is fake, which translates into significant fraudulent activity around login and authentication. Unfortunately, conventional username/password-based authentication is unreliable, and multifactor authentication adds user friction. Is there a way to solve account takeover, automated attacks, and known-user recognition without compromising user experience? NuData has taken a cloud-native approach to detecting identity threats and preventing fraud. Learn how the company built an AI/ML-powered platform that enables rapid response to an ever-changing attack landscape and accelerates innovation to crush attack vectors at any scale.
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...Amazon Web Services
Predictive maintenance holds great promise for improving industrial operations across many industries, including mining, manufacturing, oil and gas, and commercial agriculture. Industrial companies want to reap the benefits of IoT applications, but there is a lot to learn before getting started. In this session, we discuss how you can improve manufacturing plant efficiency with predictive maintenance and asset condition monitoring using AWS services, including AWS IoT Core, AWS IoT Greengrass, and Amazon SageMaker. We'll also be joined on stage with Reliance Steel & Aluminum Co., the largest metals service center operator in North America, is improving their manufacturing plant efficiency with preventative maintenance and asset management using AWS services including AWS IoT Core, AWS IoT Greengrass, and Amazon SageMaker.
Find All the Threats: AWS Threat Detection and Remediation - SEC303 - Anaheim...Amazon Web Services
Join us for this hands-on workshop where we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Amazon Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and of course, Amazon GuardDuty.
Build a Next-Gen Meeting Room Experience Using Alexa for Business - SVC203 - ...Amazon Web Services
Alexa for Business brings a conversational UI to help you simplify your meeting room experience. In this session, learn how to bring Alexa for Business to your meeting room and integrate it with your existing meeting room systems. Also learn how to build skills using Alexa for Business Blueprints to enhance your meeting room experience.
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...Amazon Web Services
AWS provides storage services that fit any workload or application. In this session, we discuss each of the latest developments in Amazon S3, Amazon S3 Glacier, Amazon EBS, Amazon EFS, Amazon FSx for Windows File Server, Amazon FSx for Lustre, AWS Storage Gateway, the AWS Snow family, AWS Transfer for SFTP, and AWS DataSync. We also examine which workloads and applications are best suited to each storage service.
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
Over the last 7 years, Alert Logic has helped AWS customers achieve enhanced security and peace of mind. Learn how positive security outcomes are attained by combining human expertise and the latest in AWS security in this engaging session with Jack Danahy, SVP of Security at Alert Logic, and Zach Vinduska, VP of IT Infrastructure and Security at ClubCorp. Hear real-world examples of how expert defenders in Alert Logic’s 24/7 Security Operations Center can help you quickly detect threats, verify them as incidents, and support you in responding quickly and effectively.
Ambient Intelligence: Bringing ML & AI to the Connected Home - SVC302 - Anahe...Amazon Web Services
AWS IoT Analytics is a fully managed service that makes it easy to run and operationalize sophisticated analytics on massive volumes of IoT data. In this session, we demonstrate how AWS IoT Analytics can help you incorporate the power of ambient intelligence into your IoT workflow and extract valuable insights from your generated IoT data. In addition, as we walk you through an example, we describe each of the service components, how to use them, and general best practices.
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Amazon Web Services
Fraud is a serious problem that can cost businesses billions of dollars annually and damage customer trust. Machine learning (ML) can provide flexible approach to fraud detection. ML models do not use pre-defined rules to determine whether activity is fraudulent. Instead, they are trained to recognize fraud patterns in datasets, and the models are self-learning, which enables them to adapt to new, unknown fraud patterns. In this session, we dive deep into a solution that automates the detection of potentially fraudulent activity and flags that activity for review. We discuss the architecture of the solution using Amazon SageMaker and other AWS services to provide an easy-to-deploy, end-to-end solution for fraud detection.
Overcoming tomorrow's operational challenges with AIOps - DEM05-R1 - Santa Cl...Amazon Web Services
Digital transformation, which requires an unprecedented scale and complex infrastructure, has sparked an IT service availability crisis in the enterprise. Traditional bottom-up, rules-driven approaches to incident management have outlived their usefulness. Artificial intelligence for IT operations, or AIOps, provides a new direction by using operational data to drive a top-down approach to service availability. This enables greater business agility while improving customer service, lowering operation costs, and boosting the productivity of IT operations teams. In this talk, Moogsoft CEO, Phil Tee, describes how AIOps provides enterprises with a critical advantage and paves the way for the future of service assurance.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
With the volume of business conducted online increasing at an exponential rate, the need for constant diligence in data security is more important than ever. In this chalk talk, we explore several AWS services involved with threat detection and remediation. We walk through some real-world scenarios; examine the threat-detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options; and answer your questions about threat detection on AWS. For each scenario, we review threat remediation using GuardDuty, Macie, AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Add Intelligence to Applications - AIM203 - Anaheim AWS SummitAmazon Web Services
AI has already been integrated into many use cases, but we’ve just scratched the surface of what’s possible. In this session, we cover how to use the AWS AI services to tackle three use cases that can deliver immediate value: 1) “voice of the customer” analytics to better understand what your customers are thinking and saying, 2) document analysis and processing to move beyond the limitations of traditional OCR, and 3) chatbots to improve in-app customer service and customer contact center experiences. We also discuss how to use AI in use cases within the Media, Healthcare, and Financial Services industries.
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
The move to AWS enables new application and architectural patterns that are in a continual state of change. The only way that your infrastructure, security, and operations can keep pace with these changes is with automation. In this session, we discuss the various automation tools that can be used to deploy AWS infrastructure (as code), add the VM-Series to help protect against threats (security as code), and then automatically update the policy based on Amazon GuardDuty or AWS Security Hub findings (operations as code). A brief demonstration concludes this session.
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Amazon Web Services
In this chalk talk, where we discuss a number of AWS services involved with threat detection and remediation. We walk through some real-world threat scenarios and provide recommendations on how to approach threat detection on AWS. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and, of course, GuardDuty.
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Amazon Web Services
The rapid adoption of cloud services and application migration has brought several challenges to network admins and security professionals, and it has made real-time visibility of the network an even more crucial priority. In this session, learn how Cisco Stealthwatch Cloud helps you leverage data you inherently create with AWS and within your network to prevent compute theft and orphaned compute, secure weak or incomplete access control lists (ACL), and enforce security policies beyond the traditional firewall while maintaining regulatory compliance by extending visibility across your entire network. This presentation is brought to you by AWS partner, Cisco Systems, Inc.
Cost efficiencies and security best practices with Amazon S3 storage - STG301...Amazon Web Services
Join us to learn best practices for Amazon S3 cost optimization and security. Amazon S3 supports various storage classes to help you cost-effectively store data. In this session, Amazon S3 experts discuss these storage classes, their key features, and the use cases that they support. We examine the newest storage classes, S3 Intelligent-Tiering and S3 Glacier Deep Archive. Learn about Amazon S3 access control policies, encryption, and security monitoring. Also, learn how to use S3 Block Public Access, a feature that helps you enforce a no public access policy for an individual bucket, a group of buckets, or an entire account.
Building enterprise solutions with blockchain and ledger technology - SVC202 ...Amazon Web Services
Blockchain technology is evolving rapidly. Are you ready to take advantage of blockchain’s use cases for the enterprise? In this session, learn how AWS views blockchain and ledger technology, get introduced to our services, and watch a demo of our new managed blockchain service, Amazon Managed Blockchain, which makes it easy to build and manage scalable Hyperledger Fabric networks on AWS.
Amazon digital user engagement solutions - SVC221 - New York AWS SummitAmazon Web Services
In this session, we describe how AWS provides the Amazon customer-centric culture of innovation, key technology building blocks, and a user engagement platform to help companies better engage their users. You also learn how Disney’s streaming service is utilizing the Amazon approach to engage its users. The intended audience for this session includes developers and business professionals who are responsible for digitally transforming their company.
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitAmazon Web Services
Encryption is an essential tool for protecting data, and your key management practices provide the means to control access to sensitive and regulated information. In this session, we provide an overview of AWS Key Management Service (AWS KMS) and show you how it integrates with encryption capabilities across AWS. We describe how customers can use AWS KMS features to gain additional control over their keys and satisfy compliance requirements. Representatives from Slack join us to describe how the company used AWS KMS to give its customers increased control and visibility over the data that Slack protects on their behalf.
Discuss data migration with AWS experts - STG304 - Santa Clara AWS SummitAmazon Web Services
AWS offers a variety of data migration services and tools to help you move everything from gigabytes to petabytes of data using your networks, our networks, the mail, or even a tractor-trailer. We briefly cover a few key data migration services, including the AWS Snow family and AWS DataSync. We then engage in an interactive discussion about specific customer use cases to help you understand which technology is best for your needs. Come and join the discussion.
Using ML to detect and prevent fraud without compromising user experience - F...Amazon Web Services
Based on NuData Security’s experience analyzing internet traffic, the company estimates that more than half is fake, which translates into significant fraudulent activity around login and authentication. Unfortunately, conventional username/password-based authentication is unreliable, and multifactor authentication adds user friction. Is there a way to solve account takeover, automated attacks, and known-user recognition without compromising user experience? NuData has taken a cloud-native approach to detecting identity threats and preventing fraud. Learn how the company built an AI/ML-powered platform that enables rapid response to an ever-changing attack landscape and accelerates innovation to crush attack vectors at any scale.
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...Amazon Web Services
Predictive maintenance holds great promise for improving industrial operations across many industries, including mining, manufacturing, oil and gas, and commercial agriculture. Industrial companies want to reap the benefits of IoT applications, but there is a lot to learn before getting started. In this session, we discuss how you can improve manufacturing plant efficiency with predictive maintenance and asset condition monitoring using AWS services, including AWS IoT Core, AWS IoT Greengrass, and Amazon SageMaker. We'll also be joined on stage with Reliance Steel & Aluminum Co., the largest metals service center operator in North America, is improving their manufacturing plant efficiency with preventative maintenance and asset management using AWS services including AWS IoT Core, AWS IoT Greengrass, and Amazon SageMaker.
Find All the Threats: AWS Threat Detection and Remediation - SEC303 - Anaheim...Amazon Web Services
Join us for this hands-on workshop where we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Amazon Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and of course, Amazon GuardDuty.
Build a Next-Gen Meeting Room Experience Using Alexa for Business - SVC203 - ...Amazon Web Services
Alexa for Business brings a conversational UI to help you simplify your meeting room experience. In this session, learn how to bring Alexa for Business to your meeting room and integrate it with your existing meeting room systems. Also learn how to build skills using Alexa for Business Blueprints to enhance your meeting room experience.
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...Amazon Web Services
AWS provides storage services that fit any workload or application. In this session, we discuss each of the latest developments in Amazon S3, Amazon S3 Glacier, Amazon EBS, Amazon EFS, Amazon FSx for Windows File Server, Amazon FSx for Lustre, AWS Storage Gateway, the AWS Snow family, AWS Transfer for SFTP, and AWS DataSync. We also examine which workloads and applications are best suited to each storage service.
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
Over the last 7 years, Alert Logic has helped AWS customers achieve enhanced security and peace of mind. Learn how positive security outcomes are attained by combining human expertise and the latest in AWS security in this engaging session with Jack Danahy, SVP of Security at Alert Logic, and Zach Vinduska, VP of IT Infrastructure and Security at ClubCorp. Hear real-world examples of how expert defenders in Alert Logic’s 24/7 Security Operations Center can help you quickly detect threats, verify them as incidents, and support you in responding quickly and effectively.
Ambient Intelligence: Bringing ML & AI to the Connected Home - SVC302 - Anahe...Amazon Web Services
AWS IoT Analytics is a fully managed service that makes it easy to run and operationalize sophisticated analytics on massive volumes of IoT data. In this session, we demonstrate how AWS IoT Analytics can help you incorporate the power of ambient intelligence into your IoT workflow and extract valuable insights from your generated IoT data. In addition, as we walk you through an example, we describe each of the service components, how to use them, and general best practices.
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Amazon Web Services
Fraud is a serious problem that can cost businesses billions of dollars annually and damage customer trust. Machine learning (ML) can provide flexible approach to fraud detection. ML models do not use pre-defined rules to determine whether activity is fraudulent. Instead, they are trained to recognize fraud patterns in datasets, and the models are self-learning, which enables them to adapt to new, unknown fraud patterns. In this session, we dive deep into a solution that automates the detection of potentially fraudulent activity and flags that activity for review. We discuss the architecture of the solution using Amazon SageMaker and other AWS services to provide an easy-to-deploy, end-to-end solution for fraud detection.
Overcoming tomorrow's operational challenges with AIOps - DEM05-R1 - Santa Cl...Amazon Web Services
Digital transformation, which requires an unprecedented scale and complex infrastructure, has sparked an IT service availability crisis in the enterprise. Traditional bottom-up, rules-driven approaches to incident management have outlived their usefulness. Artificial intelligence for IT operations, or AIOps, provides a new direction by using operational data to drive a top-down approach to service availability. This enables greater business agility while improving customer service, lowering operation costs, and boosting the productivity of IT operations teams. In this talk, Moogsoft CEO, Phil Tee, describes how AIOps provides enterprises with a critical advantage and paves the way for the future of service assurance.
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
With the volume of business conducted online increasing at an exponential rate, the need for constant diligence in data security is more important than ever. In this chalk talk, we explore several AWS services involved with threat detection and remediation. We walk through some real-world scenarios; examine the threat-detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options; and answer your questions about threat detection on AWS. For each scenario, we review threat remediation using GuardDuty, Macie, AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat-detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS services that detect and remediate threats, such as Amazon GuardDuty. Be sure to also check out the corresponding Threat Detection chalk talk.
Join us for this hands-on workshop where we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. Learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, AWS Config, and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using the following services: AWS CloudFormation, Amazon S3, AWS CloudTrail, VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, Macie, DNS logs, AWS Lambda, AWS Config, Amazon Inspector, and of course, GuardDuty.
Detecting and mitigating threats with AWS - SEC301 - Chicago AWS SummitAmazon Web Services
Rarely does a day go by that we’re not reminded about the importance of the security of our online assets. Bad actors are continuously probing and looking for ways to compromise organizations’ defenses to gain access to valuable data or cause disruptions. In this session, learn how to address threat detection and remediation with AWS. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of the key AWS services that detect and remediate threats, such as Amazon GuardDuty.
AWS Summit Milano 2019 - Sicurezza in AWS automazione e best practice - Antonio Duma, Solutions Architect, AWS | Carmela Gambardella, Solutions Architect AWS
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Amazon Web Services
The struggle to safeguard valuable online assets is an ongoing and critical one. But to protect those assets, first we must detect the threats and then effectively respond. In this hands-on workshop, we walk through some real-world threat scenarios and show you the AWS services involved with threat detection and remediation. You learn about the threat detection capabilities of Amazon GuardDuty, Amazon Macie, and AWS Config and the available remediation options. For each hands-on scenario, we review methods to remediate the threat using GuardDuty, Macie, and AWS Config, as well as AWS CloudFormation, Amazon S3, AWS CloudTrail, Amazon VPC Flow Logs, Amazon CloudWatch Events, Amazon SNS, DNS logs, AWS Lambda, and Amazon Inspector.
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Amazon Web Services
Amazon GuardDuty is a threat detection system that is reimagined and purpose-built for the cloud. Once enabled, GuardDuty immediately starts analyzing continuous streams of account and network activity in near real-time and at scale. You do not have to deploy or manage any additional security software, sensors, or network appliances. Threat intelligence is pre-integrated into the service and is continuously updated and maintained. This session introduces you to GuardDuty, walks you through the detection of an event, and discusses the various ways you can react and remediate.
Join us for this hands-on workshop where you will learn about a number of AWS services you can use to identify and respond to threats in your AWS environments. Learn about the capabilities of Amazon GuardDuty, Amazon Macie, Amazon Inspector, and AWS Security Hub as you walk through real-world threat scenarios. For each scenario, we will review methods to detect and respond to threats both manually and automated using services like Amazon CloudWatch Events and AWS Lambda.
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitAmazon Web Services
In this session, learn how to address threat detection and remediation at AWS. We summarize the challenges of traditional threat detection efforts and explain how AWS helps you address them in a cloud environment. We also provide an overview of key AWS
Architecting security & governance across your AWS environmentAmazon Web Services
Many AWS customers use multiple accounts to meet their requirements for billing, infrastructure isolation, and separation of duties. In this session, we discuss the latest updates around establishing and building a multi-account security and governance strategy. We will also take a look at data protection strategies for ensuring data integrityand availability using the AWS native services.
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
As you continually evolve your use of the AWS platform, it’s important to consider ways to improve your security posture and take advantage of new security services and features. In this advanced session, we share architectural patterns for meeting common challenges, service limits and tips, tricks, and ways to continually evaluate your architecture against best practices. Automation and tools are featured throughout, and there will be code giveaways! Be prepared for a technically deep session on AWS security.
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
In this session you will learn how to align your AWS environment to industry standard best practices for security. This session covers AWS' prescriptive recommendations for securing cloud workloads, including the the Well-Architected Framework for Security. In addition, see how AWS Security Hub simplifies the task of measuring the security of your workloads.
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Amazon Web Services
"This workshop provides the opportunity for you get familiar with AWS security services and learn how to use them to identify and remediate threats in your environment. Learn how to use Amazon GuardDuty, Amazon Macie, Amazon Inspector, and AWS Security Hub to investigate threats during and after an attack, set up a notification and response pipeline, and add additional protections to improve your environment’s security posture.
Security & Identity: the Continuous Mitigation & Diagnostic Journey on AWSAmazon Web Services
Strengthening the security of federal networks, systems, and data is one of the most important challenges we face as a nation. The Office of Management and Budget (OMB) issued guidance that all federal agencies must establish information exchanges between their dashboards and the central federal dashboard. To assist in this requirement, we explore how agencies can implement a continuous diagnostics and mitigation (CDM) program using AWS. Topics include AWS services that map to CDM requirements; how to enforce compliance with standards; ways to provide visibility into current and actual states; how to centralize service data to build a dashboard; and how to create a chief information officer FISMA dashboard using AWS native services.
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Amazon Web Services
GE has very deep security requirements for their cloud applications. In this session, hear their story on replacing on premises complex solutions with AWS native services like Amazon GuardDuty, VPC Flow logs, AWS CloudTrail, and AWS Config rules. Learn how large enterprises can accelerate their cloud adoption by meeting established security standards with AWS native services. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Perdita di dati, interruzione di servizi, danni economici e di immagine. Queste sono alcune delle conseguenze degli attacchi informatici, non solo nel mondo privato ma anche nella PA.
In this session, learn how AWS thinks about threat detection and remediation. We summarize the challenges of traditional threat detection efforts and explain how AWS helps address these challenges. We also provide an overview of key AWS services that detect and remediate threats to AWS. Finally, Terren Peterson, the VP of Software Engineering at Capital One, shares how his organization detects and remediates threats using Amazon GuardDuty and other AWS services.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.