fbpx

Navigating the threat detection and incident response track at re:Inforce 2024

reInforce 2024 blog

   <p><em><strong>A full conference pass is $1,099. <a href="https://register.reinforce.awsevents.com/?trk=direct" target="_blank" rel="noopener">Register today</a> with the code flashsale150 to receive a limited time $150 discount, while supplies last.</strong></em></p> 
   <p>We’re counting down to <a href="https://reinforce.awsevents.com/" target="_blank" rel="noopener">AWS re:Inforce</a>, our annual cloud security event! We are thrilled to invite security enthusiasts and builders to join us in Philadelphia, PA, from June 10–12 for an immersive two-and-a-half-day journey into cloud security learning. This year, we’ve expanded the event by half a day to give you more opportunities to delve into the latest security trends and technologies. At AWS re:Inforce, you’ll have the chance to explore the breadth of the <a href="https://aws.amazon.com/" target="_blank" rel="noopener">Amazon Web Services (AWS)</a> security landscape, learn how to operationalize security services, and enhance your skills and confidence in cloud security to improve your organization’s security posture. As an attendee, you will have access to over 250 sessions across multiple topic tracks, including data protection; identity and access management; threat detection and incident response; network and infrastructure security; generative AI; governance, risk, and compliance; and application security. Plus, get ready to be inspired by our lineup of customer speakers, who will share their firsthand experiences of innovating securely on AWS.</p> 
   <p>In this post, we’ll provide an overview of the key sessions that include lecture-style presentations featuring real-world use cases from our customers, as well as the interactive small-group sessions led by AWS experts that guide you through practical problems and solutions.</p> 
   <p>The threat detection and incident response track is designed to demonstrate how to detect and respond to security risks to help protect workloads at scale. AWS experts and customers will present key topics such as threat detection, vulnerability management, cloud security posture management, threat intelligence, operationalization of AWS security services, container security, effective security investigation, incident response best practices, and strengthening security through the use of generative AI and securing generative AI workloads.</p> 
   <h2>Breakout sessions, chalk talks, and lightning talks</h2> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr201" target="_blank" rel="noopener"><strong>TDR201</strong></a><strong> | Breakout session | How NatWest uses AWS services to manage vulnerabilities at scale</strong><br>As organizations move to the cloud, rapid change is the new normal. Safeguarding against potential security threats demands continuous monitoring of cloud resources and code that are constantly evolving. In this session, NatWest shares best practices for monitoring their AWS environment for software and configuration vulnerabilities at scale using AWS security services like <a href="https://aws.amazon.com/inspector/" target="_blank" rel="noopener">Amazon Inspector</a> and <a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener">AWS Security Hub</a>. Learn how security teams can automate the identification and prioritization of critical security insights to manage alert fatigue and swiftly collaborate with application teams for remediation.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr301" target="_blank" rel="noopener"><strong>TDR301</strong></a><strong> | Breakout session | Developing an autonomous framework with Security Lake &amp; Torc Robotics</strong><br>Security teams are increasingly seeking autonomy in their security operations. <a href="https://aws.amazon.com/security-lake/" target="_blank" rel="noopener">Amazon Security Lake</a> is a powerful solution that allows organizations to centralize their security data across AWS accounts and Regions. In this session, learn how Security Lake simplifies centralizing and operationalizing security data. Then, hear from Torc Robotics, a leading autonomous trucking company, as they share their experience and best practices for using Security Lake to establish an autonomous security framework.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr302" target="_blank" rel="noopener"><strong>TDR302</strong></a><strong> | Breakout session | Detecting and responding to threats in generative AI workloads</strong><br>While generative AI is an emerging technology, many of the same services and concepts can be used for threat detection and incident response. In this session, learn how you can build out threat detection and incident response capabilities for a generative AI workload that uses <a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener">Amazon Bedrock</a>. Find out how to effectively monitor this workload using Amazon Bedrock, <a href="https://aws.amazon.com/guardduty/" target="_blank" rel="noopener">Amazon GuardDuty</a>, and AWS Security Hub. The session also covers best practices for responding to and remediating security issues that may come up.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr303" target="_blank" rel="noopener"><strong>TDR303</strong></a><strong> | Breakout session | Innovations in AWS detection and response services</strong><br>In this session, learn about the latest advancements and recent AWS launches in the field of detection and response. This session focuses on use cases like threat detection, workload protection, automated and continual vulnerability management, centralized monitoring, continuous cloud security posture management, unified security data management, and discovery and protection of workloads and data. Through these use cases, gain a deeper understanding of how you can seamlessly integrate AWS detection and response services to help protect your workloads at scale, enhance your security posture, and streamline security operations across your entire AWS environment.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr304" target="_blank" rel="noopener"><strong>TDR304</strong></a><strong> | Breakout session | Explore cloud workload protection with GuardDuty, feat. Booking.com</strong><br>Monitoring your workloads at runtime allows you to detect unexpected activity sooner—before it escalates to broader business-impacting security issues. Amazon GuardDuty Runtime Monitoring offers fully managed threat detection that gives you end-to-end visibility across your AWS environment. GuardDuty’s unique detection capabilities are guided by AWS’s visibility into the cloud threat landscape. In this session, learn why AWS built the Runtime Monitoring feature and how it works. Also discover how Booking.com used GuardDuty for runtime protection, supporting their mission to make it easier for everyone to experience the world.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=tdr305" target="_blank" rel="noopener"><strong>TDR305</strong></a><strong> | Breakout session | Cyber threat intelligence sharing on AWS</strong><br>Real-time, contextual, and comprehensive visibility into security issues is essential for resilience in any organization. In this session, join the Australian Cyber Security Centre (ACSC) as they present their Cyber Threat Intelligence Sharing (CTIS) program, built on AWS. With the aim to improve the cyber resilience of the Australian community and help make Australia the most secure place to connect online, the ACSC protects Australia from thousands of threats every day. Learn the technical fundamentals that can help you apply best practices for real-time, bidirectional sharing of threat intelligence across all sectors.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR331" target="_blank" rel="noopener"><strong>TDR331</strong></a><strong> | Chalk talk | Unlock OCSF: Turn raw logs into insights with generative AI</strong><br>So, you have security data stored using the Open Cybersecurity Schema Framework (OCSF)—now what? In this chalk talk, learn how to use AWS analytics tools to mine data stored using the OCSF and leverage generative AI to consume insights. Discover how services such as <a href="https://aws.amazon.com/athena/" target="_blank" rel="noopener">Amazon Athena</a>, <a href="https://aws.amazon.com/quicksight/q/" target="_blank" rel="noopener">Amazon Q in QuickSight</a>, and Amazon Bedrock can extract, process, and visualize security insights from OCSF data. Gain practical skills to identify trends, detect anomalies, and transform your OCSF data into actionable security intelligence that can help your organization respond more effectively to cybersecurity threats.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR332" target="_blank" rel="noopener"><strong>TDR332</strong></a><strong> | Chalk talk | Anatomy of a ransomware event targeting data within AWS</strong><br>Ransomware events can interrupt operations and cost governments, nonprofits, and businesses billions of dollars. Early detection and automated responses are important mechanisms that can help mitigate your organization’s exposure. In this chalk talk, learn about the anatomy of a ransomware event targeting data within AWS including detection, response, and recovery. Explore the AWS services and features that you can use to protect against ransomware events in your environment, and learn how you can investigate possible ransomware events if they occur.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR333" target="_blank" rel="noopener"><strong>TDR333</strong></a><strong> | Chalk talk | Implementing AWS security best practices: Insights and strategies</strong><br>Have you ever wondered if you are using AWS security services such as Amazon GuardDuty, AWS Security Hub, <a href="https://aws.amazon.com/waf/" target="_blank" rel="noopener">AWS WAF</a>, and others to the best of their ability? Do you want to dive deep into common use cases to better operationalize AWS security services through insights developed via thousands of deployments? In this chalk talk, learn tips and tricks from AWS experts who have spent years talking to users and documenting guidance outlining AWS security services best practices.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR334" target="_blank" rel="noopener"><strong>TDR334</strong></a><strong> | Chalk talk | Unlock your security superpowers with generative AI</strong><br>Generative AI can accelerate and streamline the process of security analysis and response, enhancing the impact of your security operations team. Its unique ability to combine natural language processing with large existing knowledge bases and agent-based architectures that can interact with your data and systems makes it an ideal tool for augmenting security teams during and after an event. In this chalk talk, explore how generative AI will shape the future of the SOC and lead to new capabilities in incident response and cloud security posture management.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR431" target="_blank" rel="noopener"><strong>TDR431</strong></a><strong> | Chalk talk | Harnessing generative AI for investigation and remediation </strong><br>To help businesses move faster and deliver security outcomes, modern security teams need to identify opportunities to automate and simplify their workflows. One way of doing so is through generative AI. Join this chalk talk to learn how to identify use cases where generative AI can help with investigating, prioritizing, and remediating findings from Amazon GuardDuty, Amazon Inspector, and AWS Security Hub. Then find out how you can develop architectures from these use cases, implement them, and evaluate their effectiveness. The talk offers tenets for generative AI and security that can help you safely use generative AI to reduce cognitive load and increase focus on novel, high-value opportunities.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR432" target="_blank" rel="noopener"><strong>TDR432</strong></a><strong> | Chalk talk | New tactics and techniques for proactive threat detection</strong><br>This insightful chalk talk is led by the AWS Customer Incident Response Team (CIRT), the team responsible for swiftly responding to security events on the customer side of the AWS Shared Responsibility Model. Discover the latest trends in threat tactics and techniques observed by the CIRT, along with effective detection and mitigation strategies. Gain valuable insights into emerging threats and learn how to safeguard your organization’s AWS environment against evolving security risks.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR433" target="_blank" rel="noopener"><strong>TDR433</strong></a><strong> | Chalk talk | Incident response for multi-account and federated environments</strong><br>In this chalk talk, AWS security experts guide you through the lifecycle of a compromise involving federation and third-party identity providers. Learn how AWS detects unauthorized access and which approaches can help you respond to complex situations involving organizations with multiple accounts. Discover insights into how you can contain and recover from security events and discuss strong <a href="https://aws.amazon.com/iam/" target="_blank" rel="noopener">IAM</a> policies, appropriately restrictive service control policies, and resource termination for security event containment. Also, learn how to build resiliency in an environment with IAM permission refinement, organizational strategy, detective controls, chain of custody, and IR break-glass models.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR227" target="_blank" rel="noopener"><strong>TDR227</strong></a><strong> | Lightning talk | How Razorpay scales threat detection using AWS</strong><br>Discover how Razorpay, a leading payment aggregator solution provider authorized by the Reserve Bank of India, efficiently manages millions of business transactions per minute through automated security operations using AWS security services. Join this lightning talk to explore how Razorpay’s security operations team uses AWS Security Hub, Amazon GuardDuty, and Amazon Inspector to monitor their critical workloads on AWS. Learn how they orchestrate complex workflows, automating responses to security events, and reduce the time from detection to remediation.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR321" target="_blank" rel="noopener"><strong>TDR321</strong></a><strong> | Lightning talk | Scaling incident response with AWS developer tools</strong><br>In incident response, speed matters. Responding to incidents at scale can be challenging as the number of resources in your AWS accounts increases. In this lightning talk, learn how to use SDKs and the AWS Command Line Interface (AWS CLI) to rapidly run commands across your estate so you can quickly retrieve data, identify issues, and resolve security-related problems.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR322" target="_blank" rel="noopener"><strong>TDR322</strong></a><strong> | Lightning talk | How Snap Inc. secures its services with Amazon GuardDuty</strong><br>In this lightning talk, discover how Snap Inc. established a secure multi-tenant compute platform on AWS and mitigated security challenges within shared Kubernetes clusters. Snap uses Amazon GuardDuty and the OSS tool Falco for runtime protection across build time, deployment time, and runtime phases. Explore Snap’s techniques for facilitating one-time cluster access through <a href="https://aws.amazon.com/iam/identity-center/" target="_blank" rel="noopener">AWS IAM Identity Center</a>. Find out how Snap has implemented isolation strategies between internal tenants using the Pod Security Standards (PSS) and network policies enforced by the Amazon VPC Container Network Interface (CNI) plugin.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR326" target="_blank" rel="noopener"><strong>TDR326</strong></a><strong> | Lightning talk | Streamlining security auditing with generative AI</strong><br>For identifying and responding to security-related events, collecting and analyzing logs is only the first step. Beyond this initial phase, you need to utilize tools and services to parse through logs, understand baseline behaviors, identify anomalies, and create automated responses based on the type of event. In this lightning talk, learn how to effectively parse security logs, identify anomalies, and receive response runbooks that you can implement within your environment.</p> 
   <h2>Interactive sessions (builders’ sessions, code talks, and workshops)</h2> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR351" target="_blank" rel="noopener"><strong>TDR351</strong></a><strong> | Builders’ session | Accelerating incident remediation with IR playbooks &amp; Amazon Detective</strong><br>In this builders’ session, learn how to investigate incidents more effectively and discover root cause with <a href="https://aws.amazon.com/detective/" target="_blank" rel="noopener">Amazon Detective</a>. Amazon Detective provides finding-group summaries by using generative AI to automatically analyze finding groups. Insights in natural language then help you accelerate security investigations. Find out how you can create your own incident response playbooks and test them by handling multi-event security issues.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR352" target="_blank" rel="noopener"><strong>TDR352</strong></a><strong> | Builders’ session | How to automate containment and forensics for Amazon EC2</strong><br>Automated Forensics Orchestrator for <a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener">Amazon EC2</a> deploys a mechanism that uses AWS services to orchestrate and automate key digital forensics processes and activities for Amazon EC2 instances in the event of a potential security issue being detected. In this builders’ session, learn how to deploy and scale this self-service AWS solution. Explore the prerequisites, learn how to customize it for your environment, and experience forensic analysis on live artifacts to identify what potential unauthorized users could do in your environment.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR353" target="_blank" rel="noopener"><strong>TDR353</strong></a><strong> | Builders’ session | Preventing top misconfigurations associated with security events</strong><br>Have you ever wondered how you can prevent top misconfigurations that could lead to a security event? Join this builders’ session, where the AWS Customer Incident Response Team (CIRT) reviews some of the most commonly observed misconfigurations that can lead to security events. Then learn how to build mechanisms using AWS Security Hub and other AWS services that can help detect and prevent these issues.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR354" target="_blank" rel="noopener"><strong>TDR354</strong></a><strong> | Builders’ session | Insights in your inbox: Build email reporting with AWS Security Hub</strong><br>AWS Security Hub provides you with a comprehensive view of the security state of your AWS resources by collecting security data from across AWS accounts, AWS Regions, and AWS services. In this builders’ session, learn how to set up a customizable and automated summary email that distills security posture information, insights, and critical findings from Security Hub. Get hands-on with the Security Hub console and discover easy-to-implement code examples that you can use in your own organization to drive security improvements.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR355" target="_blank" rel="noopener"><strong>TDR355</strong></a><strong> | Builders’ session | Detecting ransomware and suspicious activity in Amazon RDS</strong><br>In this builders’ session, acquire skills that can help you detect and respond to threats targeting AWS databases. Using services such as <a href="https://aws.amazon.com/pm/cloud9/" target="_blank" rel="noopener">AWS Cloud9</a> and <a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener">AWS CloudFormation</a>, simulate real-world intrusions on <a href="https://aws.amazon.com/rds/" target="_blank" rel="noopener">Amazon RDS</a> and Amazon Aurora and use Amazon Athena to detect unauthorized activities. The session also covers strategies from the AWS Customer Incident Response Team (CIRT) for rapid incident response and configuring essential security settings to enhance your database defenses. The session provides practical experience in configuring audit logging and enabling termination protection to ensure robust database security measures.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR451" target="_blank" rel="noopener"><strong>TDR451</strong></a><strong> | Builders’ session | Create a generative AI runbook to resolve security findings</strong><br>Generative AI has the potential to accelerate and streamline security analysis, response, and recovery, enhancing the effectiveness of human engagement. In this builders’ session, learn how to use <a href="https://aws.amazon.com/pm/sagemaker/" target="_blank" rel="noopener">Amazon SageMaker</a> notebooks and Amazon Bedrock to quickly resolve security findings in your AWS account. You rely on runbooks for the day-to-day operations, maintenance, and troubleshooting of AWS services. With generative AI, you can gain deeper insights into security findings and take the necessary actions to streamline security analysis and response.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR441" target="_blank" rel="noopener"><strong>TDR441</strong></a><strong> | Code talk | How to use generative AI to gain insights in Amazon Security Lake</strong><br>In this code talk, explore how you can use generative AI to gather enhanced security insights within <a href="https://aws.amazon.com/security-lake/" target="_blank" rel="noopener">Amazon Security Lake</a> by integrating Amazon SageMaker Studio and Amazon Bedrock. Learn how AI-powered analytics can help rapidly identify and respond to security threats. By using large language models (LLMs) within Amazon Bedrock to process natural language queries and auto-generate SQL queries, you can expedite security investigations, focusing on relevant data sources within Security Lake. The talk includes a threat analysis exercise to demonstrate the effectiveness of LLMs in addressing various security queries. Learn how you can streamline security operations and gain actionable insights to strengthen your security posture and mitigate risks effectively within AWS environments.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR442" target="_blank" rel="noopener"><strong>TDR442</strong></a><strong> | Code talk | Security testing, the practical way</strong><br>Join this code talk for a practical demonstration of how to test security capabilities within AWS. The talk can help you evaluate and quantify your detection and response effectiveness against key metrics like mean time to detect and mean time to resolution. Explore testing techniques that use open source tools alongside AWS services such as Amazon GuardDuty and AWS WAF. Gain insights into testing your security configurations in your environment and uncover best practices tailored to your testing scenarios. This talk equips you with actionable strategies to enhance your security posture and establish robust defense mechanisms within your AWS environment.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR443" target="_blank" rel="noopener"><strong>TDR443</strong></a><strong> | Code talk | How to conduct incident response in your Amazon EKS environment</strong><br>Join this code talk to gain insights from both adversaries’ and defenders’ perspectives as AWS experts simulate a live security incident within an application across multiple <a href="https://aws.amazon.com/eks/" target="_blank" rel="noopener">Amazon EKS clusters</a>, invoking an alert in Amazon GuardDuty. Witness the incident response process as experts demonstrate detection, containment, and recovery procedures in near real time. Through this immersive experience, learn how you can effectively respond to and recover from Amazon EKS–specific incidents, and gain valuable insights into incident handling within cloud environments. Don’t miss this opportunity to enhance your incident response capabilities and learn how to more effectively safeguard your AWS infrastructure.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR444" target="_blank" rel="noopener"><strong>TDR444</strong></a><strong> | Code talk | Identity forensics in the realm of short-term credentials</strong><br>AWS Security Token Service (AWS STS) is a common way for users to access AWS services and allows you to utilize role chaining for navigating AWS accounts. When investigating security incidents, understanding the history and potential impact is crucial. Examining a single session is often insufficient because the initial abused credential may be different than the one that precipitated the investigation, and other tokens might be generated. Also, a single session investigation may not encompass all permissions that the adversary controls, due to trust relationships between the roles. In this code talk, learn how you can construct identity forensics capabilities using Amazon Detective and create a custom graph database using <a href="https://aws.amazon.com/neptune/" target="_blank" rel="noopener">Amazon Neptune</a>.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR371" target="_blank" rel="noopener"><strong>TDR371-R</strong></a><strong> | Workshop | Threat detection and response on AWS</strong><br>Join AWS experts for an immersive threat detection and response workshop using Amazon GuardDuty, Amazon Inspector, AWS Security Hub, and Amazon Detective. This workshop simulates security events for different types of resources and behaviors and illustrates both manual and automated responses with <a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener">AWS Lambda</a>. Dive in and learn how to improve your security posture by operationalizing threat detection and response on AWS.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR372" target="_blank" rel="noopener"><strong>TDR372-R</strong></a><strong> | Workshop | Container threat detection and response with AWS security services</strong><br>Join AWS experts for an immersive container security workshop using AWS threat detection and response services. This workshop simulates scenarios and security events that may arise while using <a href="https://aws.amazon.com/ecs/" target="_blank" rel="noopener">Amazon ECS</a> and Amazon EKS. The workshop also demonstrates how to use different AWS security services to detect and respond to potential security threats, as well as suggesting how you can improve your security practices. Dive in and learn how to improve your security posture when running workloads on AWS container orchestration services.</p> 
   <p><a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?search=TDR373" target="_blank" rel="noopener"><strong>TDR373-R</strong></a><strong> | Workshop | Vulnerability management with Amazon Inspector and Jenkins</strong><br>Join AWS experts for an immersive vulnerability management workshop using Amazon Inspector and Jenkins for continuous integration and continuous delivery (CI/CD). This workshop takes you through approaches to vulnerability management with Amazon Inspector for EC2 instances, container images residing in <a href="https://aws.amazon.com/ecr/" target="_blank" rel="noopener">Amazon ECR</a> and within CI/CD tools, and AWS Lambda functions. Explore the integration of Amazon Inspector with Jenkins, and learn how to operationalize vulnerability management on AWS.</p> 
   <p>Browse the full <a href="https://hub.reinforce.awsevents.com/attendee-portal/catalog/?trk=direct" target="_blank" rel="noopener">re:Inforce catalog</a> to learn more about sessions in other tracks, plus gamified learning, innovation sessions, partner sessions, and labs.</p> 
   <p>Our comprehensive track content is designed to help arm you with the knowledge and skills needed to securely manage your workloads and applications on AWS. Don’t miss out on the opportunity to stay updated with the latest best practices in threat detection and incident response. Join us in Philadelphia for re:Inforce 2024 by <a href="https://register.reinforce.awsevents.com/?trk=direct" target="_blank" rel="noopener">registering today</a>. We can’t wait to welcome you!</p> 
   <p>If you have feedback about this post, submit comments in the<strong> Comments</strong> section below. If you have questions about this post, <a href="https://console.aws.amazon.com/support/home" target="_blank" rel="noopener">contact AWS Support</a>.</p> 

   <!-- '"` -->