AWS re:Inforce Home
Subscribe

Watch on demand

Check out the breakout content, leadership sessions, and keynote from AWS re:Inforce 2023.
Watch now
Agenda
Keynote
Leadership sessions
Sponsors
Venue
Learn
Attendee guides
AWS Builder Labs
Breakout content
Catalog
Expo
Community
Sustainability
How to re:Inforce
FAQs
Justify your trip
Mobile App
Background image

First-time attendees

This guide is for first-time attendees of AWS re:Inforce who want to secure their organization’s operations, applications, and data while they modernize and scale their operations.

Overview

Cyril Bandolo
  • Cyril Bandolo

    As we move more of our workloads to the cloud and continue to scale our operations, I believe that being more rigorous in improving the security of our applications and data only gets more and more important every single day.

     

    While working on some serverless projects on AWS with Forbes 100 companies, I’ve seen how important these aspects can be and why security should be very high on the priority list.

     

    I’m super excited that re:Inforce 2023 is right around the corner. As you make plans for the sessions to attend, there are very interesting sessions that I believe first-time attendees will benefit from. Sessions that cover topics like scaling access in AWS Identity and Access Management (IAM) are interesting, and I’m very excited they’re on the list this year.

     

    This re:Inforce guide will give you all the information you need to optimize the time you spend learning about securing your workloads.

    AWS Machine Learning Hero
Session Type

Breakout Sessions

IAM305 | Scaling access with AWS IAM Identity Center, feat. Allegiant Airlines

I’m looking forward to this session, as it’ll benefit anyone who wants to learn how to scale assignment of permission sets to users and groups.

 

IAM helps you control access to AWS resources. When you have multiple groups and users in your organization, it becomes difficult to manage access to resources. You can either manage them by using an AWS Organizations organizational unit, role-based access control, or implementation of access control policies— all examples of ways to manage scaling with IAM.

 

Allegiant Airlines will share how they were able to successfully manage scaling access by automating federated role-based access to more than 5,000 AWS accounts, all while using infrastructure as code and a CI/CD pipeline.

IAM303 | Balance least privilege & agile development, feat. Fidelity & Merck

This session will benefit anyone that wants to learn how to balance between securing multiple AWS accounts and facilitating agile development.

 

Agile development methodologies are getting increasingly popular nowadays, as they help with shorter time to market, adaptability to change, and being able to collaborate effectively. The downside is that team members need to be given a high degree of control.

 

On the other hand, giving too much access increases security risks. And this is where the principle of least privilege sets in. Here we need to give team members minimum access to avoid data breaches, cybersecurity events, and other potential risks.

 

Fidelity and Pfizer will share how they were able to successfully empower their business stakeholders to quickly develop solutions at scale while still conforming to security standards and operating.

IAM306 | Managing hybrid workloads with IAM Roles Anywhere, featuring Hertz

This session will benefit anyone that wants to learn how to define and manage identities for your workloads and how to monitor and audit activities performed by those identities.

 

Many organizations are adopting a hybrid cloud structure, and this can be challenging when trying to manage access to resources across multiple platforms. IAM Roles Anywhere allows administrators to assign roles to on-premises resources or other cloud platforms.

 

In this session, Hertz will share how they used IAM Roles Anywhere to secure a non-AWS application’s access to AWS services, while improving security with this practice.

NIS303 | How Zillow uses AWS security services to build a secure perimeter

This session will benefit anyone that wants to learn how Zillow uses AWS Firewall Manager to centrally manage AWS WAF rules and AWS Shield Advanced protection across multiple accounts.

 

With all of the recent application and data breaches, the security of data and applications is becoming increasingly important every single day. IAM, encryption, monitoring, and logging are some of the methods companies use to protect their data.

 

Zillow will share how they used AWS Firewall Manager to centrally manage AWS WAF rules and AWS Shield Advanced protection across multiple accounts and also how the solution helped them respond promptly to the well-publicized Log4j vulnerability.

DAP305 | Using AWS data protection services for innovation and automation

This session will benefit anyone that wants to learn how to protect their most sensitive data using a comprehensive set of AWS data protection services to securely manage their own keys, certificates, and application secrets.

 

Learn how AWS KMS, AWS Private Certificate Authority, and AWS Secrets Manager can help ensure security and other organizational compliance.

 

Recommendation

These sessions above are a great start for first-time re:Inforce attendees.

 

It’s also important for first-time attendees to seize opportunities to collaborate with other AWS builders and AWS Partners in the expo, as well as engaging with the security community as a whole.

Home of AWS re:Inforce

Subscribe for AWS re:Inforce updates

Thank you for subscribing to re:Inforce updates.

Join the AWS Cloud community

Agenda Code of Conduct FAQs Keynote Sponsors Terms and Conditions

Privacy • Site Terms • Cookie Preferences • © 2023, Amazon Web Services, Inc. or its affiliates. All rights reserved.