| | Threat model cheat sheets Kings room |
| AWS WAF for DDoS Mitigation Portland room |
| | |
| | Creating ELK Dashboards Table 1 |
| | | |
| | Time slot over-subscribed | Akamai WAF & Ruleset Pedley room | API Threat Modeling Cheat Sheet Kings room |
| Time slot over-subscribed | AWS Lambda Security Portland room |
| | Time slot over-subscribed | AWS Scenarios | Using AI and ML for incident response Larch room |
|
| Time slot over-subscribed | Hands on Chaos Experiments Pedley room |
| Create AWS Security Questions Montague room |
| Time slot over-subscribed | Securing AWS S3 Buckets Portland room |
| | |
| | Time slot over-subscribed | Akamai Alerting and Logging Table 1 | Replacing Akamai with AWS Shield Table 5 |
| | | |
| | AWS Macie and Guard Duty Kings room |
| | | |