Background image

Watch on demand

Check out the re:Inforce 2024 keynote, innovation talks, and breakout content

Keynote and innovation talks
Breakout content
Focus area

Keynote and innovation talks

  • Keynote

    Chris Betz, AWS CISO, shares the latest innovations and vision for AWS security, including how AWS secures the cloud and how organizations can move both quickly and securely. Steve Schmidt, Amazon CSO, joins Chris to share his unique perspective on how a strong culture of security can support your business’s safe use of generative AI. Ash Edmondson, AVP of Security Architecture and Engineering at Eli Lilly, reveals the choices that are central to achieving security at enterprise scale. Hear from them on product demonstrations as well as guidance on securing your infrastructure, applications, and customer data effectively with AWS solutions, and learn how to put their ideas into action.
    This keynote includes a number of exciting launches, including AWS Private CA Connector for SCEP, passkeys as supported multi-factor authentication in AWS Identity and Access Management (IAM), IAM Access Analyzer unused access findings recommendation, Amazon GuardDuty Malware Protection for S3, generative AI–powered query generation in AWS CloudTrail Lake (preview).
  • Explorations of cryptography research  |  SEC204-INT

    AWS continues to innovate to help organizations protect data and privacy—both their own and that of their end users. In this talk, hear from the AWS applied cryptography research team about a variety of cutting-edge research areas, including post-quantum cryptography, innovations in homomorphic encryption in use, and privacy preserving techniques that include secure multi-party computation, searchable symmetric cryptography, and more. This moderated panel includes some of the world’s leading cryptography researchers, who share insights into their latest research at Amazon and how AWS invests on behalf of our customers.
  • The building blocks of a culture of security  |  SEC202-INT

    Much has been said about how to create a culture of security, yet this remains a challenge for organizations around the world. Culture change is an ongoing process that can be derailed by competing priorities, lack of resources, and organizational inertia. What does the evolution of a culture of security look like, and what lessons can be learned from efforts by existing organizations, including AWS? This talk explores strategies and examples for building an organizational culture where security is valued as fundamental to business success.
  • Securely accelerating generative AI innovation | SEC203-INT

    Generative AI has quickly shifted from theory, to curiosity, to a key priority for businesses. Organizations using this technology are seeing tangible benefits, but how does this change their security approach? What do security teams need to do to help quickly gain the advantages of generative AI? This talk explores how AWS approaches the security considerations for building with generative AI, what you need to protect, and how you can help ensure that your models perform as intended. Establishing proper protections for generative AI workloads now will help drive innovation across your organization—giving your teams the confidence to pursue big ideas and grow your business.
  • Provably secure authorization  |  SEC201-INT

    Automated reasoning has revolutionized how AWS demonstrates the security of controls. This new model is called provable security, where automated reasoning tools apply mathematical logic to help answer critical questions about your infrastructure. In this talk, learn how AWS has used automated reasoning to prove the security properties of AWS access controls, namely IAM authorization. In addition, the talk covers the capabilities and services AWS has built for users to verify their own security postures. For example, AWS has used provable security techniques in the development of Cedar, an open source policy language that is now available to use in the custom applications through Amazon Verified Permissions.

Breakout content

  • Application security

    Application security

    Learn about the mechanisms and technological approaches your organization can use to ingrain security in your software development. Explore approaches to moving fast while staying secure, and get interactive experience with tools that help you ship securely.

     

     

    Watch now
  • Data protection

    Data protection

    Learn how AWS, customers, and AWS Partners work together to protect data across industries including financial services, healthcare, and the public sector. Hear from AWS leaders about how AWS customers innovate in the cloud, use the latest generative AI tools, and raise the bar on data security, resilience, and privacy.

     

     

    Watch now
  • Governance, risk, and compliance

    Governance, risk, and compliance

    Dive deep into the latest ways to improve governance, risk management, and compliance (GRC) in your organization. This track is tailored for security practitioners and business stakeholders in risk, audit, compliance, or legal roles, and it is suitable for anyone interested in understanding enterprise GRC to achieve business, security, and regulatory outcomes.
    Watch now
  • Identity and access management

    Identity and access management

    Learn how to use AWS identity services to manage identities, resources, and permissions securely and at scale. AWS experts detail permission guardrail deployment across your organization and how to specify and define fine-grained access controls so that you can make progress toward least privilege.

     

    Watch now
  • Network and infrastructure security

    Network and infrastructure security

    Learn how to use AWS network and application services to run applications with the highest level of reliability, security, and performance. Explore the key topics of application networking, edge networking, perimeter protection, hybrid connectivity, and more.

     

    Watch now
  • Threat detection and incident response

    Threat detection and incident response

    Discover how to detect and respond to security risks to help protect workloads at scale. Explore threat detection, vulnerability management, cloud security posture management, security data management, and best practices for security investigation and incident response.

     

    Watch now

Focus area

  • DevSecOps

    Security leaders are embracing the efficiency and automation of DevSecOps. Learn how to shift left and make security a business enabler with strategies around secure coding, vulnerability management, security testing in CI/CD pipelines, automated testing, and supply chain security tooling. Discover how integrating security into every part of the DevOps process can help you move fast while staying secure.
    Watch now
  • Culture of security

    Building a proactive organizational culture of security is key to accelerating innovation in the cloud. Join these sessions to learn best practices for embedding security into your organization’s people, processes, and technologies. Explore strategies for defining security requirements, training processes, and facilitating productive partnerships between security and the rest of your business teams.
    Watch now
  • Generative AI

    Explore practical solutions for securely harnessing the power of generative AI on AWS. Gain insights into safeguarding your data in AI workloads, implementing controls and guardrails for foundation models (FM) and AI applications, and leveraging generative AI to bolster your security operations and incident response. Experts will share the info you need to accelerate your generative AI journey, securely.
    Watch now
Home of AWS re:Inforce
June 16–18, 2025 | Philadelphia, PA

Thank you for subscribing to re:Inforce updates.

Join the AWS Cloud community

Learn about AWS

What is AWS? AWS security blog AWS Merch Store

Resources

FAQs Plan your trip Justify your trip Sponsors Sustainability

Help

Contact us Accessibility services Code of conduct Terms & conditions

Privacy • Site Terms • Cookie Preferences • © 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.