47:01 Demonstration of threat detection operationalization best practices Discover foundational security services through demos that show how real-world vulnerabilities and unauthorized behaviors are identified, prioritized, and operationalized for fast remediation. Watch Video
43:04 New AWS security services for container threat detection Learn about new threat detection capabilities, deployment best practices for each service, and how to best operationalize these services for your container workloads running in AWS. Watch Video
44:30 Six Habits of Highly Effective Threat Detection/Incident Response Teams Discover how you can take advantage of cloud-scale security as you do detection and incident response for ransomware threats. Watch Video
44:35 Demystifying PKI and certificates on AWS Learn about AWS services and capabilities for managing and deploying certificates and certificate authorities on AWS, including common use cases for enabling encryption in transit. Watch Video
41:07 Secrets management best practices Learn how advanced users make the most of AWS Secrets Manager features, including fine-grained access control, automatic secret rotation, cross-region replication, and centralized monitoring. Watch Video
48:23 Best practices for protecting data using encryption Discover common AWS KMS encryption & digital signature patterns, and learn more about recently launched features (ABAC, Amazon S3 Bucket Keys, multi-region keys) and improvements to AWS crypto tools. Watch Video
39:31 Practical guidance to get to least privilege IAM at scale Get to least privilege in your AWS environment with security controls that you can engage on your first day in AWS, and techniques for continuously updating access across your environments over time. Watch Video
19:35 Explore, organize, and manage access to your AWS resources Learn how AWS is helping organizations effectively manage their cloud resources with Tag Editor, Tag Policy, AWS Resource Groups, and AWS Resource Access Manager. Watch Video
20:25 Managing identities and access across AWS accounts Explore common patterns that existing customers have used to successfully migrate their existing AWS access solutions to AWS SSO with no interruption to users. Watch Video
32:11 Streamline Compliance Reporting with Audit Manager Learn how AWS Audit Manager’s pre-built reporting frameworks reduce technical complexity and manual data collection for simplified audit preparation, risk assessments, and ongoing issue monitoring. Watch Video
59:43 Designing for data privacy on AWS Learn how to build reusable privacy enhancing patterns into your AWS deployments so you can quickly address data minization, data-centric design. and cross-border data flows. Watch Video
45:40 Cloud compliance, assurance, and auditing Learn to continuously assess, manage, and maintain compliance for formalized standards, and deep dive into how you can achieve governance and compliance using preventative and detective guardrails. Watch Video