SEC212-R1

AWS re:Invent 2019: [REPEAT 1] Vulnerability disclosure and response with AWS security (SEC212-R1)

AWS re:Invent 2022 - AWS data protection: Using locks, keys, signatures, and certificates (SEC212)

AWS re:Invent 2019: Bringing intelligence to the edge for connected-home use cases (IOT310-R1)

AWS re:Invent 2019: Achieve your identity, security, and compliance goals on AWS (GPSTEC415)

AWS re:Invent 2019: Detect network and security anomalies with Traffic Mirroring (MKT203-R1)

AWS re:Invent 2019: It’s always day zero: Working on open source and security (OPN219)

AWS re:Invent 2020: Secure and compliant machine learning for regulated industries

Aligned Technology Group: AWS Security Reference Architecture

AWS re:Inforce 2022 - Identity-centric security for AWS: Who can access your data? (DEM303-S)

AWS Summit Canberra 2022 - Event detection and response with AWS Security Hub

AWS re:Invent 2019: How you can scale up with Amazon EC2 for up to 90% less (DEM58-S)

AWS re:Invent 2022 - Navigating sovereignty and data protection with AWS (WPS203)

Security is Everyone's Responsibility – Beacon Defence (Promo)

AWS re:Invent 2019: Accolade speeds health answers to customers with Amazon Connect (EUC337)

AWS re:Invent 2022 Session - How to Prepare for the Next Evolution of Cyberattacks

AWS re:Invent 2019: Seamless networking across the edge, the private cloud, and AWS (DEM33-S)

AWS On Air ft. Comprehensive Controls Management with AWS Control Tower

What is a Vulnerability Disclosure Policy (VDP)?

AWS re:Invent 2022 - Data protection and governance on AWS (STG207)

AWS Certified Security Specialty Certification - What I used to prepare in 2023

AWS re:Invent 2022 - Operating highly available Multi-AZ applications (ARC329)

Data protection and compliance on AWS - AWS Online Tech Talks

AWS re:Invent 2019: How to build a company founded on engineering principles (STP208)

Get Actionable Insights Using Log Analytics on AWS | AWS Events