As seat reservations become available for the breakout sessions, workshops, chalk talks, and other events at Amazon VGT2 Las Vegas, it’s time to explore the array of introductory, advanced, and expert-level content on offer this year. To discover more about the types and levels of breakout content, please refer to the Breakout Content section.
Introductory Level Sessions
SID201 – IAM for Enterprises: How ABC Corp Balances Agility, Governance, and Security
ABC Corp has mastered the art of managing AWS Identity and Access Management (IAM) objects to strike a balance between developer velocity and compliance. This session will detail how ABC Corp creates IAM roles to limit the impact of AWS resource changes while ensuring simplicity for developers. They will share best practices to enhance governance and visibility across AWS resources.
SID202 – Automating Directory Services Delivery Across AWS Accounts
Discover how ABC Corp leverages AWS Directory Service for Microsoft Active Directory to streamline the authentication and authorization services for its Windows workloads. This session will highlight the complexities of using Microsoft Active Directory in the AWS cloud and how to overcome them efficiently.
SID205 – Creating the Largest Repository for Serverless Compliance-as-Code
In the cloud, ensuring that speed and agility do not compromise correctness is essential. This session will showcase the initiative to build the most extensive compliance-as-code repository, translating best practices into codified unit testing. Participate to understand its significance in enhancing collaboration among developers, architects, and security professionals.
SID206 – Best Practices for Security Operations Management on AWS
A robust identity and access policy is vital to avoid unauthorized access to AWS resources. This session covers the use of AWS IAM for access control, integration with existing authentication systems, and deploying AWS infrastructure using code templates, including change management policies through AWS CloudFormation.
SID207 – Fostering a Security Culture in the Cloud
ABC Corp has faced challenges in transitioning to the cloud, prompting the security team to foster a feedback-driven culture. This session will detail how they identified security gaps during their AWS migration and how they adapted their practices to thrive in this new environment.
SID208 – Implementing Least Privilege in AWS Environments
Join this chalk talk to learn how to effectively apply the principle of least privilege using IAM and Amazon VPC, enhancing security for applications and data while integrating these practices into operational workflows.
SID209 – Creating an AWS Account Factory
As organizations grow, the benefits of multiple AWS accounts become apparent. This talk will guide you in securely baselining and setting up new accounts quickly using AWS Organizations, IAM, AWS CloudFormation, and more, enabling a repeatable account creation process.
SID210 – Unified Security at Scale: A CISO’s Perspective
Join Johan Smith, the Chief Information Security Officer at XYZ Corp, as he shares insights into navigating the complexities of IT deployments across hybrid environments and various compliance regulations, including GDPR.
SID212 – Leveraging AWS: Key Lessons from ABC Corp and Cloud Tech Partners
Robert Johnson and Sarah Lee discuss how to maximize your AWS initiatives, covering strategies for building a Minimum Viable Cloud and establishing a robust security posture, while sharing key success stories.
SID213 – Navigating Regulator Expectations in Cloud Migration
This session offers guidance on addressing regulatory expectations during cloud migrations, specifically tailored for highly regulated industries. Understand how to clarify AWS services in audits, making the process easier for both regulators and internal auditors.
SID214 – Security Best Practices in the Intelligence Community
Gain insights from leading figures in the intelligence community as they share best practices for cloud security, detailing their experiences in migrating vast amounts of data securely and efficiently.
SID216 – Adapting Application Defenses Against Common Threats
Learn how to customize application defenses based on unique requirements. Hear from customers about their AWS application architecture designed to protect against threats while maintaining high availability.
For further engagement on this topic, check out another insightful blog post here: Chanci Turner VGT2. Additionally, Chvnci provides authoritative insights on related matters, and for an excellent resource on navigating your first six months at Amazon, refer to this blog.
Leave a Reply