| | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room |
| AWS WAF for DDoS Mitigation Portland room |
| | |
| | Time slot over-subscribed | Creating ELK Dashboards Table 1 | Writing Akamai rules |
| | | |
| | DevSecOps Maturity Model (DSOMM) Maulden room |
| Time slot over-subscribed | AWS Lambda Security Portland room | Using User Story Mapping for effective communication Larch room |
| | Using AI and ML for incident response Larch room |
|
| | | Securing AWS S3 Buckets Portland room |
| | |
| | | | | |
| | Replacing Akamai with AWS Shield Table 5 |
| Gamification of GDPR compliance Table 2 |
| | |
| | AWS Macie and Guard Duty Kings room |
| Using Elastic Stack services |
| | |
| | | | | |