Hi [[ session.user.profile.firstName ]]

AWS EMEA Webinars

  • Date
  • Rating
  • Views
  • Generating Insights from IoT Data Using Amazon Machine Learning
    Generating Insights from IoT Data Using Amazon Machine Learning Neeraj Kumar, Solutions Architect, AWS Recorded: May 24 2017 34 mins
    If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

    AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

    Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

    In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

    Learning objectives:

    - Understand why you may use Amazon Machine Learning with IoT and how to set it up.
    - Understand how to use IoT Rules Engine
  • Architecting Security and Governance Across a Multi-Account Strategy
    Architecting Security and Governance Across a Multi-Account Strategy Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS Recorded: May 17 2017 56 mins
    Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance.

    At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
  • Securing Enterprise Big Data workloads
    Securing Enterprise Big Data workloads Pratim Das, Specialist Solutions Architect – Analytics, AWS Recorded: May 17 2017 33 mins
    Security of big data workloads in a hybrid IT environment often comes as an afterthought. This session discusses how enterprises can architect secure, big-data workloads on AWS. We cover the application of authentication, authorization, encryption, and additional security principles and mechanisms to workloads leveraging Amazon Elastic MapReduce (EMR) and Amazon Redshift.
  • 3 Easy Steps to Building Large-Scale IoT Architectures
    3 Easy Steps to Building Large-Scale IoT Architectures Jan Metzner, Specialist Solutions Architect IoT/Mobile in EMEA, AWS Recorded: May 10 2017 30 mins
    You have already started connecting your devices to AWS IoT. You can control them from the cloud. And you can collect, store and analyse data from all your devices in the cloud. So far so good, but you now need to build an architecture that will serve millions of users and devices concurrently.

    In this session, Jan will explain how you can build a real world IoT architecture that serves millions of devices. The talk will focus on user and device onboarding, device and user access management, message exchange and end user access to live and historical data stored in the cloud.

    Learning objectives:

    - Learn simple steps to build a real-world IoT architecture that serves millions of devices
    - Understand how to onboard and manage users and IoT devices and to access live and historial data in the cloud
  • How AI connects the dots for IoT - Augmenting IoT Solutions with AI
    How AI connects the dots for IoT - Augmenting IoT Solutions with AI Danilo Poccia, Technical Evangelist, AWS Recorded: May 10 2017 38 mins
    IoT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.

    In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).

    Learning objectives:

    - Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
    - Gain insights into practical use cases for Amazon AI services
    - Understand the possibilities of using AI from an IoT device
  • Compliance with AWS - Verifying AWS Security
    Compliance with AWS - Verifying AWS Security Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS Recorded: May 10 2017 55 mins
    Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

    In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how to meet many compliance requirements and ensured that Amazon EC2 instances are immediately protected as they come online.
  • No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime
    No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime John Fokker, Raj Samani, Ben Potter Recorded: May 3 2017 52 mins
    Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.
  • Automating Security Event Reponses
    Automating Security Event Reponses Steve Turner, Solutions Architect, AWS Recorded: Apr 26 2017 46 mins
    With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to automatically respond to and process security events that may occur within your AWS environment. These including prevention, detection, response, and remediation. This session covers the process of automating security event response using various AWS building blocks, gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
  • How Harvard Improves Scalable Cloud Network Security
    How Harvard Improves Scalable Cloud Network Security Leo Zhadanovsky, Thomas Vachon Recorded: Apr 26 2017 53 mins
    With constantly evolving threats across the Internet, Harvard University deployed a security network platform to mitigate cyber threats, current and future, to protect institutional and research data. By using multiple geographic locations, best of breed equipment, and network automation, Harvard provides visibility, availability, and multilayer protections for their cloud network. This talk discusses the benefits, considerations, and lessons learned from using their security network platform at the edge of the cloud. Learn how Harvard designed and deployed the platform, utilizing serverless architecture to orchestrate the solution from within to protect their most sensitive data and afford students, faculty, and staff the flexibility of cloud computing.
  • Cyber Resiliency – surviving the breach
    Cyber Resiliency – surviving the breach Misha Govshteyn, Sven Skoog Recorded: Apr 19 2017 58 mins
    In this session, you’ll learn how to setup your AWS environment to avoid a cyber security attack and how to build a cloud specific incident response plan if your organization is breached. Cyber security expert and founder of Alert Logic Misha Govshteyn will share lessons learned from organizations that have protected themselves in AWS and from those that have been breached but quickly resolved their issues and implemented strong controls as a result. Joining Misha will be Sven Skoog, Senior Manager IT Security at Monotype who will discuss the cyber security posture they implemented within the AWS cloud and how they have built a robust process to ensure ongoing protection. Session sponsored by Alert Logic.

Embed in website or blog