├── README.md ├── reInvent-2014.md ├── reInvent-2015.md ├── reInvent-2016.md ├── reinvent-2017.md └── webinar_channel.md /README.md: -------------------------------------------------------------------------------- 1 | # aws-security-talks 2 | This repo contains a list of aws security related talks. 3 | -------------------------------------------------------------------------------- /reInvent-2014.md: -------------------------------------------------------------------------------- 1 | | Name | URL | 2 | |------------------------------------------------------------------------------------|---------------------------------------------| 3 | | (SEC406) NEW LAUNCH: Secure Applications with AWS Key Management Service | https://www.youtube.com/watch?v=0kWpm1FyG_Q | 4 | | (SEC314) Customer Perspectives on Implementing Security Controls with AWS | https://www.youtube.com/watch?v=E4bGk5WCtUU | 5 | | (SEC309) Amazon VPC Configuration: When Least Privilege Meets the Tester | https://www.youtube.com/watch?v=kBCbz7L52-Q | 6 | | (SEC403) Building AWS Partner Applications Using IAM Roles | https://www.youtube.com/watch?v=JbmJ4BSpNqE | 7 | | (SEC311) Architecting for End-to-End Security in the Enterprise | https://www.youtube.com/watch?v=IT-krK_wI3o | 8 | | (SEC310) Integrating AWS with External Identity Management | https://www.youtube.com/watch?v=Y3uSYpFJVvQ | 9 | | (SEC308) Navigating PCI Compliance in the Cloud | https://www.youtube.com/watch?v=LUGe0lofYa0 | 10 | | (SEC307) Building a DDoS-Resilient Architecture with Amazon Web Services | https://www.youtube.com/watch?v=OT2y3DzMEmQ | 11 | | (SEC306) Turn on CloudTrail: Log API Activity in Your AWS Account | https://www.youtube.com/watch?v=BJprWgompq0 | 12 | | (SEC303) Mastering Access Control Policies | https://www.youtube.com/watch?v=0WI5sirOvco | 13 | | (SEC202) Closing the Gap: Moving Critical | https://www.youtube.com/watch?v=fIqVS0mI83w | 14 | | (SEC405) Enterprise Cloud Security via DevSecOps | https://www.youtube.com/watch?v=gT6djiVrJxs | 15 | | (SEC404) Incident Response in the Cloud | https://www.youtube.com/watch?v=nzSrRvADh6g | 16 | | (SEC312) Taking a DevOps Approach to Security | https://www.youtube.com/watch?v=Ck9HvlKxKPs | 17 | | (SEC402) Intrusion Detection in the Cloud | https://www.youtube.com/watch?v=WUQNeMhkaco | 18 | | (SEC316) SSL with Amazon Web Services | https://www.youtube.com/watch?v=8AODa_AazY4 | 19 | | (SEC313) Updating Security Operations for the Cloud | https://www.youtube.com/watch?v=mGZZ20wxjrg | 20 | | (SEC304) Bring Your Own Identities – Federating Access to Your AWS Environment | https://www.youtube.com/watch?v=debJ3o5w0MA | 21 | | (SEC302) Delegating Access to Your AWS Environment | https://www.youtube.com/watch?v=0zJuULHFS6A | 22 | | (SEC315) NEW LAUNCH: Get Deep Visibility into Resource Configurations | https://www.youtube.com/watch?v=zP5giSxe8fM | 23 | | (SEC301) Encryption and Key Management in AWS | https://www.youtube.com/watch?v=bqIYI3mDsd4 | 24 | | (SEC305) IAM Best Practices | https://www.youtube.com/watch?v=ZhvXW-ILyPs | 25 | | (SEC201) AWS Security Keynote Address | https://www.youtube.com/watch?v=OEK7mHn4JLs | 26 | -------------------------------------------------------------------------------- /reInvent-2015.md: -------------------------------------------------------------------------------- 1 | | Name | URL | 2 | |-----------------------------------------------------------------------------------|---------------------------------------------| 3 | | (SEC313) Security and Compliance at the Petabyte Scale | https://www.youtube.com/watch?v=hRQgpQMzwTI | 4 | | (SEC308) Wrangling Security Events in The Cloud | https://www.youtube.com/watch?v=uc1Q0XCcCv4 | 5 | | (SEC323) NEW LAUNCH! Securing Web Applications with AWS WAF | https://www.youtube.com/watch?v=yWSn5E6WQug | 6 | | (SEC201) How Should We All Think About Security? | https://www.youtube.com/watch?v=fCH4r3s4THQ | 7 | | (SEC310) Keeping Developers and Auditors Happy in the Cloud | https://www.youtube.com/watch?v=Io00_K4v12Y | 8 | | (SEC202) Best Practices for Securely Leveraging the Cloud | https://www.youtube.com/watch?v=Rh92FgMGBYc | 9 | | (SEC203) Journey to Securing Time Inc's Move to the Cloud | https://www.youtube.com/watch?v=lfhhXnFizRU | 10 | | (SEC204) AWS GovCloud (US): Not Just for Govies | https://www.youtube.com/watch?v=PmmdNwzrbgw | 11 | | (SEC205) Learn How to Hackproof Your Cloud Using Native AWS Tools | https://www.youtube.com/watch?v=1ERy_YomoYk | 12 | | (SEC301) Strategies for Protecting Data Using Encryption in AWS | https://www.youtube.com/watch?v=On9NoUwj-Os | 13 | | (SEC302) IAM Best Practices to Live By | https://www.youtube.com/watch?v=_wiGpBQGCjU | 14 | | (SEC304) Architecting for HIPAA Compliance on AWS | https://www.youtube.com/watch?v=g4XI4IIYVrw | 15 | | (SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less | https://www.youtube.com/watch?v=Du478i9O_mc | 16 | | (SEC306) Defending Against DDoS Attacks | https://www.youtube.com/watch?v=Ys0gG1koqJA | 17 | | (SEC307) A Progressive Journey Through AWS IAM Federation Options | https://www.youtube.com/watch?v=-XARG9W2bGc | 18 | | (SEC312) Reliable Design and Deployment of Security and Compliance | https://www.youtube.com/watch?v=KtMANvC7_n8 | 19 | | (SEC315) AWS Directory Service Deep Dive | https://www.youtube.com/watch?v=CY-xvo8Cc54 | 20 | | (SEC316) Harden Your Architecture w/ Security Incident Response Simulations | https://www.youtube.com/watch?v=u-mRU44Q5u4 | 21 | | (SEC318) AWS CloudTrail Deep Dive | https://www.youtube.com/watch?v=t0e-mz_I2OU | 22 | | (SEC320) Leveraging the Power of AWS to Automate Security & Compliance | https://www.youtube.com/watch?v=rOhT6zuSGOE | 23 | | (SEC321) Implementing Policy | https://www.youtube.com/watch?v=8kBNbeN4tnQ | 24 | | (SEC324) New! Introducing Amazon Inspector | https://www.youtube.com/watch?v=HjuEtMrWc_w | 25 | | (SEC325) Satisfy PCI Obligations While Continuing to Innovate | https://www.youtube.com/watch?v=sRs-K_z7BKc | 26 | | (SEC326) Security Science Using Big Data | https://www.youtube.com/watch?v=kE-5MzWlU7U | 27 | | (SEC401) Encryption Key Storage with AWS KMS at Okta | https://www.youtube.com/watch?v=pi4HTSrmzis | 28 | | (SEC402) Enterprise Cloud Security via DevSecOps 2.0 | https://www.youtube.com/watch?v=fqjwlKKA-V4 | 29 | | (SEC403) Diving into AWS CloudTrail Events w/Apache Spark on EMR | https://www.youtube.com/watch?v=oZ8HswQSbNQ | 30 | | (SEC303) Architecting for End-to-End Security in the Enterprise | https://www.youtube.com/watch?v=nqaL5zJqFuo | 31 | | (SEC314-R) New! AWS Config Rules: Improve Governance Over Configuration Changes | https://www.youtube.com/watch?v=sGUQFEZWkho | 32 | -------------------------------------------------------------------------------- /reInvent-2016.md: -------------------------------------------------------------------------------- 1 | | Name | URL | 2 | |---------------------------------------------------------------------------------------|---------------------------------------------| 3 | | Mitigating DDoS Attacks on AWS: Five Vectors and Four Use Cases (SEC310) | https://www.youtube.com/watch?v=w9fSW6qMktA | 4 | | Get the Most from AWS KMS: Architecting Applications for High Security (SEC303) | https://www.youtube.com/watch?v=EgJ9EQn0EJ8 | 5 | | Microservices | https://www.youtube.com/watch?v=vmGSK6gT0J8 | 6 | | Automated Formal Reasoning About AWS Systems (SEC401) | https://www.youtube.com/watch?v=U40bWY6oVtU | 7 | | Automating Security Event Response | https://www.youtube.com/watch?v=x4GkAGe65vE | 8 | | Audit Your AWS Account Against Industry Best Practices: CIS Benchmarks (SEC301) | https://www.youtube.com/watch?v=3lkecchwxc4 | 9 | | re:Source Mini Con for Security Services State of the Union (SEC312) | https://www.youtube.com/watch?v=8ZljcKn8FPA | 10 | | Reduce Blast Radius by Using Multiple AWS Accounts Per Region & Service (SEC304) | https://www.youtube.com/watch?v=ha2ojsF27dg | 11 | | How to Automate Policy Validation (SEC311) | https://www.youtube.com/watch?v=pm-4vSMSDyc | 12 | | Proactive Security Testing in AWS: Early Implementation to Testing (SEC309) | https://www.youtube.com/watch?v=iyNDEAs8hRk | 13 | | Scaling Security Resources for Your First 10 Million Customers (SEC305) | https://www.youtube.com/watch?v=Rmf91qNcN8w | 14 | | Securing Enterprise Big Data Workloads on AWS (SEC308) | https://www.youtube.com/watch?v=WOz707HK_Kw | 15 | | Common Considerations for Data Integrity Controls in Healthcare (SEC314) | https://www.youtube.com/watch?v=MjiEVLL6UsA | 16 | | Become an AWS IAM Policy Ninja in 60 Minutes or Less (SAC303) | https://www.youtube.com/watch?v=y7-fAT3z8Lo | 17 | | Encryption: It Was the Best of Controls | https://www.youtube.com/watch?v=zmMpgbIhCpw | 18 | | Life Without SSH: Immutable Infrastructure in Production (SAC318) | https://www.youtube.com/watch?v=fEuN5LkXfZk | 19 | | Architecting Security and Governance Across a Multi-Account Strategy (SAC319) | https://www.youtube.com/watch?v=pqq39mZKQXU | 20 | | IAM Best Practices to Live By (SAC317) | https://www.youtube.com/watch?v=SGntDzEn30s | 21 | | The Psychology of Security Automation (SAC307) | https://www.youtube.com/watch?v=LWbRFQ8bVJQ | 22 | | NEW LAUNCH! AWS Shield—A Managed DDoS Protection Service (SAC322) | https://www.youtube.com/watch?v=R06GDQBbtRU | 23 | | NEW SERVICE: Manage Multiple AWS Accounts with AWS Organizations (SAC323) | https://www.youtube.com/watch?v=xW6sErOpLD0 | 24 | | 5 Security Improvements You Can Make by Using CloudWatch and AWS Rules (SAC401) | https://www.youtube.com/watch?v=5Yd2xTjEkAc | 25 | | Deep Dive: Security and Governance Across a Multi-Account Strategy (SAC320) | https://www.youtube.com/watch?v=xjtSWd8z_bE | 26 | | Lessons from a Chief Security Officer: Achieving Continuous Compliance (SAC201) | https://www.youtube.com/watch?v=_8KzARC1XbM | 27 | | GxP Compliance in the Cloud (SAC314) | https://www.youtube.com/watch?v=jJtUgzAbcGw | 28 | | Predictive Security: Using Big Data to Fortify Your Defenses (SAC304) | https://www.youtube.com/watch?v=Wh7nvpVQ_58 | 29 | | Hackproof Your Cloud: Responding to 2016 Threats (SAC308) | https://www.youtube.com/watch?v=jOmBIOGtQ1s | 30 | | No Ransomware: How Europol | https://www.youtube.com/watch?v=HWYsoJvcWBE | 31 | | Architecting for End-to-End Security in the Enterprise (SAC312) | https://www.youtube.com/watch?v=XFZjBJMFeck | 32 | | How AWS Automates Internal Compliance at Massive Scale with AWS Services(SAC305) | https://www.youtube.com/watch?v=75JzVu1laLc | 33 | | Security Automation: Spend Less Time Securing Your Applications (SAC316) | https://www.youtube.com/watch?v=2ndF7LSZmOE | 34 | | Securing Serverless Architectures | https://www.youtube.com/watch?v=8mpTpOXmws8 | 35 | | Enterprise Patterns for Payment Card Industry Data Security Standard (SAC313) | https://www.youtube.com/watch?v=LrLL6rokuGo | 36 | | Scaling Security Operations and Automating Governance (SAC315) | https://www.youtube.com/watch?v=_yfeCvqHdNg | 37 | | How Harvard University Improves Scalable Cloud Network Security (SAC326) | https://www.youtube.com/watch?v=_SOc4-Ra2kM | 38 | | Cyber Resiliency – surviving the breach (SAC321) | https://www.youtube.com/watch?v=mxyEO5EqrkA | 39 | | You Can’t Protect What You Can’t See: Security & Compliance from Adobe (SAC309) | https://www.youtube.com/watch?v=-C08o4vVH24 | 40 | | Evolving an Enterprise-Level Compliance Framework with Amazon CloudWatch(SAC311) | https://www.youtube.com/watch?v=BIH2xBuKbnM | 41 | | The AWS Hero’s Journey to Achieving Autonomous | https://www.youtube.com/watch?v=RvIjgfUT-C0 | 42 | -------------------------------------------------------------------------------- /reinvent-2017.md: -------------------------------------------------------------------------------- 1 | | Name | URL | 2 | |------------------------------------------------------------------------------------------------- |--------------------------------------------- | 3 | | Using AWS Management Tools to Enable Governance, Compliance, Operational, and Risk Auditing | https://www.youtube.com/watch?v=Q7zF6sT5Bis | 4 | | How FINRA Secures Its Big Data and Data Science Platform on AWS | https://www.youtube.com/watch?v=tONmArf07QI | 5 | | our First 100 Automations for Compliance, Security and Operations | https://www.youtube.com/watch?v=39PoEgJA0Nk | 6 | | Secure Your Edge-to-Cloud IoT Solution with Intel and AWS | https://www.youtube.com/watch?v=6LfS3IQ2RCk | 7 | | Using Access Advisor to Strike the Balance Between Security and Usability | https://www.youtube.com/watch?v=gp4z0dCRTS0 | 8 | | How Chick-fil-A Embraces DevSecOps on AWS | https://www.youtube.com/watch?v=_0BCJLIxowQ | 9 | | Securing Serverless Applications Step-by-step | https://www.youtube.com/watch?v=B3j4xql7we0 | 10 | | Maximizing Your Move to AWS: Five Key Lessons Learned from Vanguard | https://www.youtube.com/watch?v=aKEwyDOSL1w | 11 | | Disaster Recovery with AWS: Tiered Approaches to Balance Cost with Recovery Objectives | https://www.youtube.com/watch?v=a7EMou07hRc | 12 | | SecOps 2021 Today: Using AWS Services to Deliver SecOps | https://www.youtube.com/watch?v=ZoCJ_VIsLQs | 13 | | Managing Regulator Expectations - Lessons Learned on Positioning | https://www.youtube.com/watch?v=tZRU2fmSRsc | 14 | | Introduction to Amazon GuardDuty | https://www.youtube.com/watch?v=Imjbh0WPSR4 | 15 | | How Dow Jones Identifies, Analyzes, and Remediates Security Issues | https://www.youtube.com/watch?v=Z0wl_lIq4Ys | 16 | | Continuous Compliance on AWS at Scale | https://www.youtube.com/watch?v=h4eClhXPvoc | 17 | | Embedding Security into DevOps on AWS with Automation Toolsets | https://www.youtube.com/watch?v=Gz68BlZm7ZQ | 18 | | AWS Security State of the Union | https://www.youtube.com/watch?v=Wvyc-VEUOns | 19 | | Fraud Prevention, Detection, Lessons Learned, and Best Practices | https://www.youtube.com/watch?v=n89TdCrR1HQ | 20 | | Security and DevOps: Agility and Teamwork | https://www.youtube.com/watch?v=noBJdxlSYvw | 21 | | Automating Security and Compliance Testing of Infrastructure-as-a-code | https://www.youtube.com/watch?v=xzQUmil3LBM | 22 | | Best Practices for Preventing Data Loss in Microsoft Office 365 | https://www.youtube.com/watch?v=HuMuUU5VHJg | 23 | | Architecting Container Infrastructure for Security and Compliance | https://www.youtube.com/watch?v=Ofu22X7qHnc | 24 | | Automate and Control Your Keys for the Hybrid Cloud World | https://www.youtube.com/watch?v=Lv-6eBxkFt4 | 25 | | Manage Infrastructure Securely at Scale and Eliminate Operational Risks | https://www.youtube.com/watch?v=VJf1i_b-2Kc | 26 | | Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 | https://www.youtube.com/watch?v=mbdC6IhOROk | 27 | | Graph-based Approaches for Cyber Investigative Analytics | https://www.youtube.com/watch?v=KqAug2jtmDY | 28 | | Leveraging a Cloud Policy Framework - From Zero to Well Governed | https://www.youtube.com/watch?v=cXROIajhhT4 | 29 | | Enabling Governance, Compliance, and Operational and Risk Auditing | https://www.youtube.com/watch?v=aQXSdaoZHCw | 30 | | Building the Largest Repo for Serverless Compliance-as-Code | https://www.youtube.com/watch?v=VR_4209ewIo | 31 | | A CISO’s Journey at Vonage: Achieving Unified Security at Scale | https://www.youtube.com/watch?v=9ll-lt6jqQw | 32 | | Cloud-Native App Protection: Web Application Security at Pearson | https://www.youtube.com/watch?v=xtAXg7zll3w | 33 | | From Obstacle to Advantage: The Changing Role of Security & Compliance in your organization | https://www.youtube.com/watch?v=PAqXrg_gKDU | 34 | | Incident Response in the Cloud | https://www.youtube.com/watch?v=ufmgB9M2WII | 35 | | How Capital One Applies AWS Organizations Best Practices to Manage multiple AWS accounts | https://www.youtube.com/watch?v=ZKpkF17d0Oo | 36 | | The AWS Philosophy of Security | https://www.youtube.com/watch?v=KJiCfPXOW-U | 37 | | Automating DDoS Response in the Cloud | https://www.youtube.com/watch?v=6pQ3j4IcpY8 | 38 | | Amazon Macie: Data Visibility Powered by Machine Learning for Security and Compliance workloads | https://www.youtube.com/watch?v=LCjX2rsQ2wA | 39 | | Security and Compliance at Scale with Infrastructure as a Code | https://www.youtube.com/watch?v=aEE4RLnpQU8 | 40 | | Cloud Adoption in Regulated Financial Services | https://www.youtube.com/watch?v=goX61THbKuA | 41 | | A Deep Dive on Amazon Cognito | https://www.youtube.com/watch?v=jLQjQpUYw6g | 42 | | Five New Security Automation Improvements You Can Make by Using CloudWatch and Config | https://www.youtube.com/watch?v=RWHBv1YgkE8 | 43 | | Security Validation through Continuous Delivery at Verizon | https://www.youtube.com/watch?v=BnXyQFv-nYo | 44 | | Serverless Authentication and Authorization | https://www.youtube.com/watch?v=VZqG7HjT2AQ | 45 | | Cloud Security for Regulated Industries | https://www.youtube.com/watch?v=3H0z-aHKozA | 46 | | Continuous Compliance for Healthcare and Life Sciences | https://www.youtube.com/watch?v=F1nMQPDSrD4 | 47 | | How CrowdStrike Built a Real-time Security Monitoring Service | https://www.youtube.com/watch?v=iOL7hNy9dIA | 48 | | Secure File Collaboration using WorkDocs | https://www.youtube.com/watch?v=7PSim8kSkik | 49 | | How You can use AWS’ Identity Services to be Successful | https://www.youtube.com/watch?v=fx7WWYTBvXU | 50 | | Best Practices on Configuring and Securing CloudFront | https://www.youtube.com/watch?v=8U3QdNSFJDU | 51 | | Applying AI/ML to Find Security Needles in the Haystack | https://www.youtube.com/watch?v=Xo9-SQB08BY | 52 | | The Unusual Suspect | https://www.youtube.com/watch?v=LwjaPKo1Qkk | 53 | | Build a Serverless, Face-Recognizing IoT Security System | https://www.youtube.com/watch?v=frW28vPfngU | 54 | | Designing for Disney/Marvel Studio-Grade Security | https://www.youtube.com/watch?v=0VBlhboXRF0 | 55 | | Automated Policy Enforcement for Real-time Operations, Security | https://www.youtube.com/watch?v=bIxvkGpmx_k | 56 | | Minimal Viable Cloud with Maximum Security | https://www.youtube.com/watch?v=ZOKo0xXX-FA | 57 | | Compliance and Top Security Threats in the Cloud | https://www.youtube.com/watch?v=Rc55aYODnMI | 58 | | Real-Time Anomaly Detection Using Amazon Kinesis | https://www.youtube.com/watch?v=NMFvBeKFCHM | 59 | | Adopting Microservices in Healthcare: Building a Compliant DevOps | https://www.youtube.com/watch?v=jMirtdSrIhE | 60 | | Security Anti-Patterns: Mistakes to Avoid | https://www.youtube.com/watch?v=tzJmE_Jlas0 | 61 | | Navigating HIPAA and HITRUST: A Quick-Start Guide to Account Gov | https://www.youtube.com/watch?v=LsRzJK5fmPo | 62 | | Is AWS GovCloud Right for Your Regulated Workload | https://www.youtube.com/watch?v=hygdRcXZWdM | 63 | | IAM Best Practices and Becoming an IAM Ninja | https://www.youtube.com/watch?v=suBsFAEJUIc | 64 | | Enhancing Customer Security Using AI/ML on AWS | https://www.youtube.com/watch?v=0QVVognrQo4 | 65 | | IAM Policy Ninja | https://www.youtube.com/watch?v=aISWoPf_XNE | 66 | | Security Change through Feedback | https://www.youtube.com/watch?v=hzpOYPhSxwc | 67 | | Architecting Security and Governance Across a Multi-Account Strategy | https://www.youtube.com/watch?v=71fD8Oenwxc | 68 | | A Deep Dive into AWS Encryption Services | https://www.youtube.com/watch?v=gTZgxsCTfbk | 69 | | Identity Federation for AWS | https://www.youtube.com/watch?v=CJexxdv054c | 70 | | Best Practices for Managing Security Operations on AWS | https://www.youtube.com/watch?v=gjrcoK8T3To | 71 | | Automating and Auditing Cloud Governance and Compliance in Multi | https://www.youtube.com/watch?v=WfIbIhIORbk | 72 | | Amazon EC2 Systems Manager Bridges Operation | https://www.youtube.com/watch?v=gd05wJ39acE | 73 | | How Vanguard Strikes the Balance Between Ag | https://www.youtube.com/watch?v=P9cwxcruCC0 | 74 | | Using AWS Lambda as a Security Team | https://www.youtube.com/watch?v=oMlGHP8-yHU | 75 | | Force Multiply Your Security Team with Automation and Alexa | https://www.youtube.com/watch?v=e6sokCFRlns | 76 | -------------------------------------------------------------------------------- /webinar_channel.md: -------------------------------------------------------------------------------- 1 | | Name | URL | 2 | |--------------------------------------------------------------------------------------------------------|---------------------------------------------| 3 | | Cloud Backup & Recovery Options with AWS Partner Solutions | https://www.youtube.com/watch?v=35bYfRr4wZk | 4 | | Policy as a Strategic Enabler for Cloud Adoption | https://www.youtube.com/watch?v=n1LTjUiLP6Y | 5 | | How Public-Sector Customers are Transforming to Drive Innovation | https://www.youtube.com/watch?v=DlfPWqXyjuE | 6 | | DevOps Tooling & Policy as a Way for Government Modernization | https://www.youtube.com/watch?v=gc6bdLkBXE0 | 7 | | Governance @ Scale: Compliance Automation in AWS | https://www.youtube.com/watch?v=ospUpn2Yaeg | 8 | | FedRAMP Accelerated: An Update with GSA & cloud.gov | https://www.youtube.com/watch?v=iXqbIxtiwQY | 9 | | IT Modernization – Be Proactive with Data | https://www.youtube.com/watch?v=ihvZmzrPlcs | 10 | | HIPAA/HITRUST - Account Governance Strategies | https://www.youtube.com/watch?v=2j-ZwHFtweM | 11 | | Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | https://www.youtube.com/watch?v=wEbjLx0sawQ | 12 | | CJIS Evidence Management in the Cloud using AWS GovCloud | https://www.youtube.com/watch?v=D76eop8pWbU | 13 | | Incident Response in the Cloud | https://www.youtube.com/watch?v=ZyeTSI900zw | 14 | | Modernizing Government in the Cloud in Highly Regulated Environments | https://www.youtube.com/watch?v=EL4t4UFJUB4 | 15 | | Serverless Design Patterns for Rethinking Traditional Enterprise Application Approaches | https://www.youtube.com/watch?v=kmYMuFrANjw | 16 | | How Different Organizations are Approaching Cloud Adoption | https://www.youtube.com/watch?v=36sOcS-M7So | 17 | | Taking a Startup Approach to Solving Societal Problems | https://www.youtube.com/watch?v=9oYMKORj7b0 | 18 | | What Organizational and Governance Changes Do I Need to Make Prior to Migrating to AWS? | https://www.youtube.com/watch?v=o3LhXXhfbbY | 19 | | Managing Security with AWS | https://www.youtube.com/watch?v=89KRJYMbKjA | 20 | | Data Innovation: Sharing Data in the Cloud for Greater Innovation and Citizen Service | https://www.youtube.com/watch?v=X8gAsnfmWRE | 21 | | Advanced Techniques for DDoS Mitigation and Web Application Defense | https://www.youtube.com/watch?v=oIPyp1QeOSs | 22 | | Is AWS GovCloud (US) Right for Your Regulated Workload? | https://www.youtube.com/watch?v=CNG_LFpM7SE | 23 | | Best Practices for Active Directory with AWS Workloads | https://www.youtube.com/watch?v=patWmzk3V7I | 24 | | Securely Deliver Your Desktop Apps to a Web Browser using Amazon AppStream 2.0 | https://www.youtube.com/watch?v=3ek0oisvnaI | 25 | | Configuration Management in the Cloud | https://www.youtube.com/watch?v=jyRlEIr9XMI | 26 | | VMWare Cloud for the AWS Cloud | https://www.youtube.com/watch?v=Sl1dcb3F5q0 | 27 | | Serverless Security Automation | https://www.youtube.com/watch?v=IxHtZNcpLZw | 28 | | Security Innovation in the Cloud: CIO & CISO Panel | https://www.youtube.com/watch?v=y-GrNht8_3k | 29 | | Meeting DFARS Requirements in AWS GovCloud | https://www.youtube.com/watch?v=aQtKqhPFYOg | 30 | | How AWS Manages Security at Massive Scale: Fireside Chat with CJ Moses, Deputy CISO AWS | https://www.youtube.com/watch?v=sfW8nQmuIG4 | 31 | | Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | https://www.youtube.com/watch?v=oLA8qP4H1Bw | 32 | | Best Practices for Microsoft Architectures on AWS | https://www.youtube.com/watch?v=X8MozcFJzWE | 33 | | How Can I Plan for Security, Risk, & Compliance Before Migrating to AWS? | https://www.youtube.com/watch?v=WQ7BzTRZZzU | 34 | | Automated Compliance and Governance | https://www.youtube.com/watch?v=9g0u_05WBig | 35 | | Securing Your AWS Infrastructure with Edge Services | https://www.youtube.com/watch?v=uCRTsaJ62s4 | 36 | | Advanced Techniques for Federation | https://www.youtube.com/watch?v=t6WWda_AY04 | 37 | | Deep Dive on Amazon Cloud Directory | https://www.youtube.com/watch?v=UANm3DC_IxE | 38 | | Applying AWS Organizations to Complex Account Structures | https://www.youtube.com/watch?v=pfetMIlo_2s | 39 | | Licensing Windows Workloads on AWS - April 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=aNfuDzvgtBA | 40 | | Manage Inventory, Patching, and System Images for Hybrid Cloud | https://www.youtube.com/watch?v=VhxZ2-SX-v8 | 41 | | AWS Webcast - Using Amazon CloudFront to Protect Your Content Delivery | https://www.youtube.com/watch?v=tpdlVrliMf0 | 42 | | Backup and Archiving in the AWS Cloud | https://www.youtube.com/watch?v=mgxZZpoufTI | 43 | | Updating Security Operations for the Cloud | https://www.youtube.com/watch?v=o-9KR1q_n4g | 44 | | Hardening Hadoop for Healthcare | https://www.youtube.com/watch?v=3wz28j-6w4k | 45 | | Understanding AWS Security | https://www.youtube.com/watch?v=rei30obkaBc | 46 | | AWS Webcast - AWS 201 Backup, Archive and Disaster Recovery | https://www.youtube.com/watch?v=_mDhX1N6BdU | 47 | | AWS Partner Webcast - Use AWS CloudTrail Data and Splunk Software to Improve Security and Compliance | https://www.youtube.com/watch?v=CXUxVtFUFW4 | 48 | | AWS Webcast - Backup & Restore for ElastiCache/Redis: Getting Started | https://www.youtube.com/watch?v=xKAnqOOtwvI | 49 | | AWS Webcast - Backup and Archiving in the AWS Cloud | https://www.youtube.com/watch?v=jS5-Jl3G09I | 50 | | AWS Webcast - AWS 201 Webinar: Using the Amazon Virtual Private Cloud (VPC) | https://www.youtube.com/watch?v=pnDGTJqRguA | 51 | | AWS Webcast - AWS 201 Webinar: Backup, Archive and Disaster Recovery | https://www.youtube.com/watch?v=Eq4Ar0a_Yrg | 52 | | AWS Webcast - Discover Disaster Recovery Solutions in AWS Cloud | https://www.youtube.com/watch?v=b0-s7-labsE | 53 | | AWS Webcast - Backup and Archiving in the AWS Cloud | https://www.youtube.com/watch?v=H9_MvmTMOzo | 54 | | AWS Webcast - Remote Desktop Gateway on AWS | https://www.youtube.com/watch?v=SV4_3_j9ZoI | 55 | | Journey Through the Cloud - Security Best Practices on AWS | https://www.youtube.com/watch?v=Ihe_8o00-WI | 56 | | Securing Your Business on the AWS Cloud | https://www.youtube.com/watch?v=UU6oQ8_SPtQ | 57 | | AWS Webcast - High Availability for Mission Critical Applications | https://www.youtube.com/watch?v=ocAqif0MTWA | 58 | | AWS Webcast - Storage and Backup | https://www.youtube.com/watch?v=o7j8uuOz4Mc | 59 | | AWS Webcast - Understanding The AWS Security Model | https://www.youtube.com/watch?v=yVWHNJel7Qs | 60 | | AWS April Webinar Series - Compliance Beyond the Check Box | https://www.youtube.com/watch?v=LlIBbDU0oiQ | 61 | | AWS April Webinar Series - How Willbros Builds Securely in AWS with Trend Micro | https://www.youtube.com/watch?v=WowGsdVJIcE | 62 | | AWS May Webinar Series: Getting Started with AWS Identity and Access Management | https://www.youtube.com/watch?v=suOObEz_2Fc | 63 | | Journey Through the Cloud - Security Best Practices | https://www.youtube.com/watch?v=rXPyGDWKHIo | 64 | | Advanced Security Best Practices Masterclass | https://www.youtube.com/watch?v=zU1x5SfKEzs | 65 | | AWS July Webinar Series - Deep Dive: Troubleshooting Operational and Security using CloudTrail | https://www.youtube.com/watch?v=WrvjEHeh_-Y | 66 | | AWS August Webinar Series - Best Practices for DDoS Resiliency 200 | https://www.youtube.com/watch?v=Fb866QDLH6U | 67 | | Journey Through the Cloud - Disaster Recovery | https://www.youtube.com/watch?v=YFuOTcOI8Bw | 68 | | AWS October 2015 Webinar Series - Essentials: Introducing AWS WAF | https://www.youtube.com/watch?v=Q_HZWmgnIZw | 69 | | AWS November 2015 Webinar Series - Essentials: Introducing Amazon CloudWatch Dashboards | https://www.youtube.com/watch?v=BcWafMCjQEI | 70 | | AWS November 2015 Webinar Series - Essentials: Introducing Config Rules | https://www.youtube.com/watch?v=SpXZtN0Pjzw | 71 | | AWS December 2015 Webinar Series - AWS Inspector | https://www.youtube.com/watch?v=ddz0JmCTTsU | 72 | | AWS APAC Webinar Week - Securing Your Business on AWS | https://www.youtube.com/watch?v=aHTQehEQmI0 | 73 | | AWS APAC Webinar Week - Top 5 ways to Secure Your Business on AWS | https://www.youtube.com/watch?v=nEeDj2OqURE | 74 | | Using AWS WAF and Lambda for Automatic Protection | https://www.youtube.com/watch?v=xskM8XA2bqE | 75 | | Improve Your HIT Security Posture by Deploying in the Cloud | https://www.youtube.com/watch?v=vszyH5Rphss | 76 | | AWS March 2016 Webinar Series - Best Practices for Managing Security Operations in AWS | https://www.youtube.com/watch?v=rvcHnJPBQMA | 77 | | AWS March 2016 Webinar Series - Best Practices for Architecting Cloud Backup and Recovery Solutions | https://www.youtube.com/watch?v=2G5HoFdd_D0 | 78 | | AWS Security Roadshow - The AWS Shared Security Responsibility Model in Practice | https://www.youtube.com/watch?v=RwUSPklR24M | 79 | | AWS Security Roadshow - Encryption Options on AWS | https://www.youtube.com/watch?v=9bn7p2tdym0 | 80 | | AWS Security Roadshow - Logging, Analysis and Alerting | https://www.youtube.com/watch?v=42-1xpT-s6U | 81 | | AWS Security Roadshow - IAM Recommended Practices | https://www.youtube.com/watch?v=R-PyVnhxx-U | 82 | | AWS June 2016 Webinar Series - Getting Started with Amazon Inspector | https://www.youtube.com/watch?v=BksbSqA3j9U | 83 | | AWS June 2016 Webinar Series - Best Practices for Architecting Cloud Backup and Recovery Solutions | https://www.youtube.com/watch?v=UEk0RkJFtCo | 84 | | AWS June 2016 Webinar Series - Improving Infrastructure Governance on AWS | https://www.youtube.com/watch?v=aqQ-WB6MXzc | 85 | | Getting Started with Your User Pools in Amazon Cognito - AWS June 2016 Webinar Series | https://www.youtube.com/watch?v=vr1njQyqlbk | 86 | | Best Practices for Managing Security Operations in AWS - AWS July 2016 Webinar Series | https://www.youtube.com/watch?v=8YWWkjZxRGY | 87 | | ECS: Monitoring Containers at Scale | https://www.youtube.com/watch?v=xJhoEO1Bqqg | 88 | | Log Analytics with Amazon Elasticsearch Service - September Webinar Series | https://www.youtube.com/watch?v=JlBNHLXb3rg | 89 | | Getting Started with Cognito User Pools - September Webinar Series | https://www.youtube.com/watch?v=zmEaYbRwaWU | 90 | | Addressing Amazon Inspector Assessment Findings - September 2016 Webinar Series | https://www.youtube.com/watch?v=s8krx9zbC1k | 91 | | Automating Compliance Defense in the Cloud - September 2016 Webinar Series | https://www.youtube.com/watch?v=WypftJGyx1E | 92 | | Account Separation & Mandatory Access Control | https://www.youtube.com/watch?v=CNSaJs7pWjA | 93 | | Add User Sign in and Management to your Apps with Amazon Cognito | https://www.youtube.com/watch?v=xLvZThZkWjI | 94 | | Build Scalable and Secure Mobile Applications with AWS | https://www.youtube.com/watch?v=4DJWf_aeK38 | 95 | | Best Practices for IoT Security in the Cloud | https://www.youtube.com/watch?v=V7wLJZszDYk | 96 | | Streamline Your Desktop Operations and Improve Security with Amazon WorkSpaces | https://www.youtube.com/watch?v=W-uW_VmKiJY | 97 | | Introduction to Three AWS Security Services - November 2016 Webinar Series | https://www.youtube.com/watch?v=55Sd7jPJPlI | 98 | | Configuration Management with AWS OpsWorks - November 2016 Webinar Series | https://www.youtube.com/watch?v=VPOOWyWPT0Y | 99 | | Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series | https://www.youtube.com/watch?v=rAaMuAUyuFI | 100 | | Best Practices for Protecting Cloud Workloads - November 2016 Webinar Series | https://www.youtube.com/watch?v=Sqpqhtm_pNk | 101 | | Announcing AWS Shield - Protect Web Applications from DDoS Attacks | https://www.youtube.com/watch?v=jEDVVxrAWTs | 102 | | Announcing Amazon EC2 Systems Manager - Hybrid Cloud Management at Scale | https://www.youtube.com/watch?v=Ek5Bx8ovvX0 | 103 | | DNS DDoS mitigation using Amazon Route 53 and AWS Shield - February 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=zAW7r7XQYhs | 104 | | Best Practices with IoT Security - February 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=8EXqmzD37QQ | 105 | | Best Practices for Managing Security Operations in AWS - March 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=KuOy63yzc8c | 106 | | Log Analytics with Amazon Elasticsearch Service & Kinesis - March 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=PFUcF9Ye0fc | 107 | | Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks | https://www.youtube.com/watch?v=wlSba1dXAhc | 108 | --------------------------------------------------------------------------------