Search Results
AWS re:Invent 2016: How to Automate Policy Validation (SEC311)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to Execution (SEC313)
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Customers (SEC305)
AWS re:Invent 2018: Policy Verification and Enforcement at Scale with AWS (SEC320)
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
AWS re:Invent 2016: You Can’t Protect What You Can’t See: Security & Compliance from Adobe (SAC309)
AWS re:Invent 2016: 5 Security Improvements You Can Make by Using CloudWatch and AWS Rules (SAC401)
AWS re:Inforce 2019: Presenting Radar: Validation and Remediation of AWS Cloud Resources (GRC343)
AWS re:Invent 2016: Embracing DevSecOps (HLC303)
AWS re:Invent 2016: Reduce Blast Radius by Using Multiple AWS Accounts Per Region & Service (SEC304)
AWS re:Invent 2014 | (ARC302) Running Lean Architectures: How to Optimize for Cost Efficiency