48:21
AWS re:Inforce 2025 -Visualizing workforce identity: Graph-based analysis for access rights (IAM341)
AWS Events
56:00
AWS re:Inforce 2025 - From detection to code: GuardDuty attack sequences with Amazon Q (TDR343)
46:03
AWS re:Inforce 2025 - Zero Trust in EKS: Securing workload identity and communication (IAM342)
1:01:53
AWS re:Inforce 2025-Demystifying attestation: Measure and verify your execution environment (DAP442)
51:46
AWS re:Inforce 2025 - Supercharge IaC security with AI: From commit to auto-remediation (APS441)
54:16
AWS re:Inforce 2025 -Move fast & stay secure: Lessons learned from the AWS prototyping team (APS341)
53:20
AWS re:Inforce 2025 - Create memory safe applications using open source verification tools (APS442)
52:12
AWS re:Inforce 2025 -Operationalizing Amazon Security Lake with analytics and generative AI (TDR342)
55:34
AWS re:Inforce 2025 - Build AI security agents with Amazon Bedrock and Amazon Security Lake (TDR341)
44:01
AWS re:Inforce 2025 - Scale beyond RBAC: Transform app access control using AVP and Cedar (IAM343)
53:05
AWS re:Inforce 2025 - Practical AI-powered security: Development best practices (APS342)
40:30
AWS re:Inforce 2025 - Encrypting data in transit for your Kubernetes applications (DAP341)
59:21
AWS re:Inforce 2025 - A deep dive into Amazon VPC Lattice granular security (NIS341)
44:52
AWS re:Inforce 2025 - Coding for proactive controls with AWS CloudFormation (GRC441)
57:57
AWS re:Inforce 2025 - Sticky situations: Building advanced AWS WAF honeypots for better security
55:17
AWS re:Inforce 2025 - Where are your secrets? Monitor keys, secrets, and certs usage on AWS (DAP441)
42:24
AWS re:Inforce 2025 - Beyond shift-left: Embedding controls in infrastructure pipelines (GRC442)
47:49
AWS re:Inforce 2025 - The right way to secure AI agents with code examples (IAM441)