Hi [[ session.user.profile.firstName ]]

Best Practices for IoT Security in the Cloud

AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices.

This webinar will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. This allows you to build interesting, meaningful applications while owning little to no infrastructure.

Learning Objectives:
• Common Internet of Things security issues
• AWS IoT Security and Access Control Mechanisms
• Build secure interactions with the AWS Cloud

Who Should Attend:
• IT Managers, Developers, Engineers, Solution Architects

Other sessions on the AWS IoT Webinar Day - 16 November:

10:00 - 11:00 GMT | Getting Started with AWS IoT
Register » https://www.brighttalk.com/webcast/9019/229023?utm_campaign=Brighttalk

12:30 - 13:30 GMT | Deep Dive on AWS IoT
Register » https://www.brighttalk.com/webcast/9019/229027?utm_campaign=Brighttalk

13:45 - 14:45 GMT | AWS IoT Real Time Stream Processing with AWS Lambda
Register » https://www.brighttalk.com/webcast/9019/229031?utm_campaign=Brighttalk
Recorded Nov 16 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Walker, Solutions Architect, Specialising in Security and Compliance across EMEA
Presentation preview: Best Practices for IoT Security in the Cloud
  • Channel
  • Channel profile
  • Generating Insights from IoT Data Using Amazon Machine Learning Recorded: May 24 2017 34 mins
    Neeraj Kumar, Solutions Architect, AWS
    If you knew the state of everything in the world, and could apply logic on top of the data, what problems could you solve?

    AWS IoT Services help you collect and send data to the cloud, make it easy to load and analyse that information, and provide the ability to manage your devices, so you can focus on developing applications that fit your needs.

    Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualisation tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology.

    In this webinar, Neeraj explains how you can use AWS IoT and Amazon Machine Learning together to build smart IoT applications. We will demonstrate how to setup Amazon Machine Learning, create and train Machine Learning models for your applications. We will then use these models in our IoT Applications, in real time.

    Learning objectives:

    - Understand why you may use Amazon Machine Learning with IoT and how to set it up.
    - Understand how to use IoT Rules Engine
  • Architecting Security and Governance Across a Multi-Account Strategy Recorded: May 17 2017 56 mins
    Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS
    Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance.

    At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
  • Securing Enterprise Big Data workloads Recorded: May 17 2017 33 mins
    Pratim Das, Specialist Solutions Architect – Analytics, AWS
    Security of big data workloads in a hybrid IT environment often comes as an afterthought. This session discusses how enterprises can architect secure, big-data workloads on AWS. We cover the application of authentication, authorization, encryption, and additional security principles and mechanisms to workloads leveraging Amazon Elastic MapReduce (EMR) and Amazon Redshift.
  • 3 Easy Steps to Building Large-Scale IoT Architectures Recorded: May 10 2017 30 mins
    Jan Metzner, Specialist Solutions Architect IoT/Mobile in EMEA, AWS
    You have already started connecting your devices to AWS IoT. You can control them from the cloud. And you can collect, store and analyse data from all your devices in the cloud. So far so good, but you now need to build an architecture that will serve millions of users and devices concurrently.

    In this session, Jan will explain how you can build a real world IoT architecture that serves millions of devices. The talk will focus on user and device onboarding, device and user access management, message exchange and end user access to live and historical data stored in the cloud.

    Learning objectives:

    - Learn simple steps to build a real-world IoT architecture that serves millions of devices
    - Understand how to onboard and manage users and IoT devices and to access live and historial data in the cloud
  • How AI connects the dots for IoT - Augmenting IoT Solutions with AI Recorded: May 10 2017 38 mins
    Danilo Poccia, Technical Evangelist, AWS
    IoT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.

    In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).

    Learning objectives:

    - Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
    - Gain insights into practical use cases for Amazon AI services
    - Understand the possibilities of using AI from an IoT device
  • Compliance with AWS - Verifying AWS Security Recorded: May 10 2017 55 mins
    Dave Walker, Specialist Solutions Architect – Security and Compliance, AWS
    Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

    In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how to meet many compliance requirements and ensured that Amazon EC2 instances are immediately protected as they come online.
  • No Ransomware: How Europol, Dutch Police & AWS Deal with Cybercrime Recorded: May 3 2017 52 mins
    John Fokker, Raj Samani, Ben Potter
    Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.
  • Automating Security Event Reponses Recorded: Apr 26 2017 46 mins
    Steve Turner, Solutions Architect, AWS
    With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to automatically respond to and process security events that may occur within your AWS environment. These including prevention, detection, response, and remediation. This session covers the process of automating security event response using various AWS building blocks, gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
  • How Harvard Improves Scalable Cloud Network Security Recorded: Apr 26 2017 53 mins
    Leo Zhadanovsky, Thomas Vachon
    With constantly evolving threats across the Internet, Harvard University deployed a security network platform to mitigate cyber threats, current and future, to protect institutional and research data. By using multiple geographic locations, best of breed equipment, and network automation, Harvard provides visibility, availability, and multilayer protections for their cloud network. This talk discusses the benefits, considerations, and lessons learned from using their security network platform at the edge of the cloud. Learn how Harvard designed and deployed the platform, utilizing serverless architecture to orchestrate the solution from within to protect their most sensitive data and afford students, faculty, and staff the flexibility of cloud computing.
  • Cyber Resiliency – surviving the breach Recorded: Apr 19 2017 58 mins
    Misha Govshteyn, Sven Skoog
    In this session, you’ll learn how to setup your AWS environment to avoid a cyber security attack and how to build a cloud specific incident response plan if your organization is breached. Cyber security expert and founder of Alert Logic Misha Govshteyn will share lessons learned from organizations that have protected themselves in AWS and from those that have been breached but quickly resolved their issues and implemented strong controls as a result. Joining Misha will be Sven Skoog, Senior Manager IT Security at Monotype who will discuss the cyber security posture they implemented within the AWS cloud and how they have built a robust process to ensure ongoing protection. Session sponsored by Alert Logic.
  • AWS Security Checklist Recorded: Apr 19 2017 36 mins
    Andrew Kane, Solutions Architect, AWS
    This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.

    Learning Objectives:

    - Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
    - Assess your existing organisational use of AWS and to ensure it meets security best practices
    - Develop AWS usage policies or validate that existing policies are being followed
  • Getting Started with AWS Security Recorded: Apr 12 2017 32 mins
    Ian Massingham, Chief Evangelist EMEA, AWS
    Learn how you can help maintain control of your environment by choosing the right AWS security tools with this introductory webinar. We will show you how AWS Identity and Access Management (IAM), AWS Config Rules, and AWS Cloud Trail can help you maintain that control. You will discover how to track changes, monitor compliance, and keep an audit record of API requests.

    Learning Objectives:

    - Learn what IAM is and how to leverage it appropriately.
    - Gain familiarity with how to track changes and monitor for compliance.
    - Keep an audit record of API requests for reporting purposes.
    - Understand how these services complement each other.
  • Security Automation: Spend Less Time Securing Your Applications Recorded: Apr 12 2017 55 mins
    Venkat, Nate
    As attackers become more sophisticated, web application developers need to constantly update their security configurations. Static firewall rules are no longer good enough. Developers need a way to deploy automated security that can learn from the application behavior and identify bad traffic patterns to detect bad bots or bad actors on the Internet. This session showcases some of the real-world customer use cases that use machine learning and AWS WAF (a web application firewall) with automated incident response and machine learning to automatically identify bad actors. We also present tutorials and code samples that show how customers can analyze traffic patterns and deploy new AWS WAF rules on the fly.
  • Architecting for End-to-End Security in the Enterprise Recorded: Apr 5 2017 47 mins
    Hart Rossman, Bill Shinn
    This session tells how our most mature, security-minded Fortune 500 customers adopt AWS while improving end-to-end protection of their sensitive data. Learn about the enterprise security architecture decisions made during actual sensitive workload deployments as told by the AWS professional services and the solution architecture team members who lived them. In this very prescriptive, technical walkthrough, we share lessons learned from the development of enterprise security strategy, security use-case development, security configuration decisions, and the creation of AWS security operations playbooks to support customer architectures.
  • Hackproof Your Cloud: Responding to 2016 Threats Recorded: Mar 29 2017 51 mins
    Aaron Newman and Aaron Klein
    CloudCheckr Co-Founders Aaron Newman and Aaron Klein will highlight effective strategies and tools that AWS users can employ to improve their security posture. Specific emphasis will be placed upon leveraging native AWS services and the talk will include concrete steps that users can begin employing immediately.
  • Predictive Security: Using Big Data to Fortify Your Defenses Recorded: Mar 22 2017 49 mins
    Michael Capicotto, Matt Nowina
    In a rapidly changing IT environment, detecting and responding to new threats is more important than ever. This session shows you how to build a predictive analytics stack on AWS, which harnesses the power of Amazon Machine Learning in conjunction with Amazon Elasticsearch Service, AWS CloudTrail, and VPC Flow Logs to perform tasks such as anomaly detection and log analysis. We also demonstrate how you can use AWS Lambda to act on this information in an automated fashion, such as performing updates to AWS WAF and security groups, leading to an improved security posture and alleviating operational burden on your security teams.
  • Lessons from a Chief Security Officer: Achieving Continuous Compliance Recorded: Mar 15 2017 57 mins
    Robert Hotaling
    Does meeting stringent compliance requirements keep you up at night? Do you worry about having the right audit trails in place as proof?

    Cengage Learning’s Chief Security Officer, Robert Hotaling, shares his organization’s journey to AWS, and how they enabled continuous compliance for their dynamic environment with automation. When Cengage shifted from publishing to digital education and online learning, they needed a secure elastic infrastructure for their data intensive and cyclical business, and workload layer security tools that would help them meet compliance requirements (e.g., PCI).

    In this session, you will learn why building security in from the beginning saves you time (and painful retrofits) later, how to gather and retain audit evidence for instances that are only up for minutes or hours, and how Cengage used Trend Micro Deep Security to meet many compliance requirements and ensured instances were instantly protected as they came online in a hybrid cloud architecture. Session sponsored by Trend Micro, Inc.
  • Deep Dive: Running Microsoft SQL Server on AWS Recorded: Feb 9 2017 35 mins
    Julien Lepine, Microsoft Specialist Solution Architect
    In our third and final Windows webinar, Amazon Web Services Microsoft Specialist SA Julien Lepine explains how SQL Server on AWS gives you complete control over every setting, without the maintenance, backup and patching requirements of traditional on-site solutions. Learn how to provision and monitor your SQL Server databases in both Amazon RDS and Amazon EC2, and how to optimise scalability, performance, availability, security and disaster recovery. The webinar will include a live Q&A, where you can get your questions answered.

    Who Should Attend:
    • IT Managers, Developers, Engineers, Solution Architects, IT Administrators, Windows Server Administrators, Database Administrators,
  • How AWS Directory Service for Microsoft AD Delivers Policy Compliance Recorded: Feb 1 2017 47 mins
    Julien Lepine, Microsoft Specialist Solution Architect
    In this Windows webinar, which is the second in the series, Amazon Web Services Microsoft Specialist SA Julien Lepine will explain the benefits of AWS Directory Service for Microsoft Active Directory (Enterprise Edition), also known as AWS Microsoft AD. This technology allows you to benefit from built-in Active Directory features such as Group Policy, trusts, and single sign-on authentication. The webinar will include a live Q&A where you can get all your AWS Microsoft AD questions answered.

    Who Should Attend:
    • IT Managers, Developers, Engineers, Solution Architects, IT Administrators, Windows Server Administrators, Systems Administrators, VP of infrastructure
  • Getting started with Windows on AWS Recorded: Jan 26 2017 46 mins
    Allan Knudsen, Business Development Manager, Windows and Enterprise Applications
    In the first of our three Windows webinars, find out about the benefits of migrating your Windows workloads to AWS. During the session, Allan Knudsen, AWS BDM for Windows in the Nordics, will explain why AWS makes your Windows applications faster, more reliable and more secure. He will also talk about how to bring your own license (BYOL), how to deploy and manage your Windows resources and how you can set up your Windows Desktop on AWS. The webinar will include a live Q&A, where you can get your questions answered.
AWS EMEA Webinars
AWS EMEA Webinars

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for IoT Security in the Cloud
  • Live at: Nov 16 2016 11:15 am
  • Presented by: Dave Walker, Solutions Architect, Specialising in Security and Compliance across EMEA
  • From:
Your email has been sent.
or close