Hi [[ session.user.profile.firstName ]]

Best Practices for IoT Security in the Cloud

AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.

This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.

Learning Objectives:
• Common Internet of Things security issues
• AWS IoT Security and Access Control Mechanisms
• Build secure interactions with the AWS Cloud

Who Should Attend:
• IT Managers, Developers, Engineers, Solution Architects

Other sessions on the AWS IoT Webinar Day - 16 November:

10:00 - 11:00 GMT | Getting Started with AWS IoT
Register » https://www.brighttalk.com/webcast/9019/229023?utm_campaign=Brighttalk

12:30 - 13:30 GMT | Deep Dive on AWS IoT
Register » https://www.brighttalk.com/webcast/9019/229027?utm_campaign=Brighttalk

13:45 - 14:45 GMT | AWS IoT Real Time Stream Processing with AWS Lambda
Register » https://www.brighttalk.com/webcast/9019/229031?utm_campaign=Brighttalk
Recorded Nov 16 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Walker, Solutions Architect, Specialising in Security and Compliance across EMEA
Presentation preview: Best Practices for IoT Security in the Cloud
  • Channel
  • Channel profile
  • Best Practices for Microsoft Architectures on AWS Recorded: Sep 6 2017 47 mins
    Julien Lepine, Principal Solutions Architect, Amazon Web Services
    Learn best practices for architecting fully available and scalable Microsoft solutions and environments on AWS. Find out how Microsoft solutions can leverage various AWS services to achieve more resiliency, replace unnecessary complexity, simplify architecture, provide scalability, introduce DevOps concepts, automation, and repeatability.
  • Getting Started with Windows on AWS Recorded: Jul 20 2017 46 mins
    Julien Lepine, Principal Solutions Architect, Amazon Web Services
    In our first Windows webinar, find out about the benefits of migrating your Windows workloads to AWS. During the session, we will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to architect, deploy, and manage your Windows platforms on AWS.
  • Getting Started with Microsoft SQL Server on AWS Recorded: Jul 20 2017 45 mins
    Julien Lepine, Principal Solutions Architect, Amazon Web Services
    In this webinar, we will explain how running SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery.
  • Software Security and Best Practices in the AWS Cloud Recorded: Jun 6 2017 29 mins
    Mike Morain, AWS Marketplace Solutions Architect
    Meet security-sensitive requirements faster. AWS provides several security capabilities and services to increase privacy and control network access that enable private or dedicated connections from your on-premises environment. In addition to the already secure AWS Cloud, AWS Marketplace offers industry-leading solutions to help you secure operating systems, platforms, applications and data that can integrate with existing controls in your AWS Cloud and hybrid environments.

    Learning objectives:

    - Learn about Marketplace security policies to ensure AWS Marketplace product security (Managed Catalog Operations)
    - Explore Security applications: vendor-enforced best-practices
    - Augmenting AWS Security offerings with Marketplace products.
  • Think IoT and not Servers - the Power of the Serverless Analytics IoT platform Recorded: May 31 2017 39 mins
    Danilo Poccia, Technical Evangelist, AWS
    Scaling IoT platforms to support production workloads can be difficult and time consuming. In this webinar, we’ll see how to design real-world IoT applications with a serverless back end. This kind of architecture can grow from very few to virtually unlimited users without any infrastructure or servers to manage. In particular, we’ll see an example of data collection from multiple IoT sensors, and how to process streaming data and present the results in a consolidated web dashboard.

    Learning objectives:

    - Learn how to implement data collection from IoT sensors using service such as AWS IoT
    - Leverage the Amazon Kinesis platform to analyse streaming data
    - Understand best practices to design a serverless architecture to process and consolidate results
  • AWS Security Best Practices Recorded: May 31 2017 37 mins
    Ian Massingham, Head of EMEA Evangelism, AWS
    AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organisation's security and compliance objectives.
  • Using Artificial Intelligence to Enhance Your Customer Experience Recorded: May 31 2017 38 mins
    Steve Turner, Solutions Architect, AWS
    Artificial Intelligence (AI) is enhancing many of the services that we interact with today. It can improve the customer experience of many services to make them more accessible, whilst providing information faster in a format that feels more natural.

    AWS provides a collection of highly scalable, pre-trained and pre-tuned managed AI services that you can adopt without any previous artificial intelligence or deep learning knowledge. In this webinar, Steve explains how to implement each of these services to improve the user journey for a flight booking and check-in system.

    The AWS solutions discussed here include Amazon Polly, which provides audio instructions for sight-impaired users and Amazon Rekognition, which provides an additional layer of security during the check-in process, matching users with customer data on file. Finally, Amazon Lex is used to enable customers to make future flight bookings using only their voices.

    Learning objectives:

    - Understand why you may wish to use AI in your applications today
    - Identify the common AI challenges and practical use cases for Amazon AI services
    - Implement Amazon AI services without a PhD or Data Science background
  • Generating Insights from IoT Data Using Amazon Machine Learning Recorded: May 24 2017 34 mins
    Neeraj Kumar, Solutions Architect, AWS
    If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

    AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

    Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

    In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

    Learning objectives:

    - Understand why you may use Amazon Machine Learning with IoT and how to set it up.
    - Understand how to use IoT Rules Engine
  • Architecting Security and Governance Across a Multi-Account Strategy Recorded: May 17 2017 56 mins
    Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS
    Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance.

    At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
  • Securing Enterprise Big Data workloads Recorded: May 17 2017 33 mins
    Pratim Das, Specialist Solutions Architect – Analytics, AWS
    Security of big data workloads in a hybrid IT environment often comes as an afterthought. This session discusses how enterprises can architect secure, big-data workloads on AWS. We cover the application of authentication, authorization, encryption, and additional security principles and mechanisms to workloads leveraging Amazon Elastic MapReduce (EMR) and Amazon Redshift.
  • 3 Easy Steps to Building Large-Scale IoT Architectures Recorded: May 10 2017 30 mins
    Jan Metzner, Specialist Solutions Architect IoT/Mobile in EMEA, AWS
    You have already started connecting your devices to AWS IoT. You can control them from the cloud. And you can collect, store and analyse data from all your devices in the cloud. So far so good, but you now need to build an architecture that will serve millions of users and devices concurrently.

    In this session, Jan will explain how you can build a real world IoT architecture that serves millions of devices. The talk will focus on user and device onboarding, device and user access management, message exchange and end user access to live and historical data stored in the cloud.

    Learning objectives:

    - Learn simple steps to build a real-world IoT architecture that serves millions of devices
    - Understand how to onboard and manage users and IoT devices and to access live and historial data in the cloud
  • How AI connects the dots for IoT - Augmenting IoT Solutions with AI Recorded: May 10 2017 38 mins
    Danilo Poccia, Technical Evangelist, AWS
    IoT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.

    In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).

    Learning objectives:

    - Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
    - Gain insights into practical use cases for Amazon AI services
    - Understand the possibilities of using AI from an IoT device
  • Compliance with AWS - Verifying AWS Security Recorded: May 10 2017 55 mins
    Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS
    Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

    In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how to meet many compliance requirements and ensured that Amazon EC2 instances are immediately protected as they come online.
  • No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime Recorded: May 3 2017 52 mins
    John Fokker, Raj Samani, Ben Potter
    Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.
  • Automating Security Event Reponses Recorded: Apr 26 2017 46 mins
    Steve Turner, Solutions Architect, AWS
    With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to automatically respond to and process security events that may occur within your AWS environment. These including prevention, detection, response, and remediation. This session covers the process of automating security event response using various AWS building blocks, gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
  • How Harvard Improves Scalable Cloud Network Security Recorded: Apr 26 2017 53 mins
    Leo Zhadanovsky, Thomas Vachon
    With constantly evolving threats across the Internet, Harvard University deployed a security network platform to mitigate cyber threats, current and future, to protect institutional and research data. By using multiple geographic locations, best of breed equipment, and network automation, Harvard provides visibility, availability, and multilayer protections for their cloud network. This talk discusses the benefits, considerations, and lessons learned from using their security network platform at the edge of the cloud. Learn how Harvard designed and deployed the platform, utilizing serverless architecture to orchestrate the solution from within to protect their most sensitive data and afford students, faculty, and staff the flexibility of cloud computing.
  • Cyber Resiliency – surviving the breach Recorded: Apr 19 2017 58 mins
    Misha Govshteyn, Sven Skoog
    In this session, you’ll learn how to setup your AWS environment to avoid a cyber security attack and how to build a cloud specific incident response plan if your organization is breached. Cyber security expert and founder of Alert Logic Misha Govshteyn will share lessons learned from organizations that have protected themselves in AWS and from those that have been breached but quickly resolved their issues and implemented strong controls as a result. Joining Misha will be Sven Skoog, Senior Manager IT Security at Monotype who will discuss the cyber security posture they implemented within the AWS cloud and how they have built a robust process to ensure ongoing protection. Session sponsored by Alert Logic.
  • AWS Security Checklist Recorded: Apr 19 2017 36 mins
    Andrew Kane, Solutions Architect, AWS
    This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.

    Learning Objectives:

    - Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
    - Assess your existing organisational use of AWS and to ensure it meets security best practices
    - Develop AWS usage policies or validate that existing policies are being followed
  • Getting Started with AWS Security Recorded: Apr 12 2017 32 mins
    Ian Massingham, Chief Evangelist EMEA, AWS
    Learn how you can help maintain control of your environment by choosing the right AWS security tools with this introductory webinar. We will show you how AWS Identity and Access Management (IAM), AWS Config Rules, and AWS Cloud Trail can help you maintain that control. You will discover how to track changes, monitor compliance, and keep an audit record of API requests.

    Learning Objectives:

    - Learn what IAM is and how to leverage it appropriately.
    - Gain familiarity with how to track changes and monitor for compliance.
    - Keep an audit record of API requests for reporting purposes.
    - Understand how these services complement each other.
  • Security Automation: Spend Less Time Securing Your Applications Recorded: Apr 12 2017 55 mins
    Venkat, Nate
    As attackers become more sophisticated, web application developers need to constantly update their security configurations. Static firewall rules are no longer good enough. Developers need a way to deploy automated security that can learn from the application behavior and identify bad traffic patterns to detect bad bots or bad actors on the Internet. This session showcases some of the real-world customer use cases that use machine learning and AWS WAF (a web application firewall) with automated incident response and machine learning to automatically identify bad actors. We also present tutorials and code samples that show how customers can analyze traffic patterns and deploy new AWS WAF rules on the fly.
AWS EMEA Webinars
AWS EMEA Webinars

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for IoT Security in the Cloud
  • Live at: Nov 16 2016 11:15 am
  • Presented by: Dave Walker, Solutions Architect, Specialising in Security and Compliance across EMEA
  • From:
Your email has been sent.
or close