My Top Re:Inforce 2025 sessions
My top sessions from the Re:Inforce 2025 Catalog
AWS conferences are known for their incredibly jam-packed days, and with the multitude of sessions going on at once, there is no way you could see even 5% of the sessions! AWS has published several guides based on job function, but if you’re working for a startup / SMB like myself, you’ll find you identify with multiple of these guides. Below, I’m sharing the sessions I’m most interested in attending at Re:Inforce 2025 as a Cloud Security Engineer for a startup.
Some criteria I use when deciding which sessions to prioritize include content, session level, and session type. In regards to session content, I tend to lean away from sessions that read extremely AI heavy. At this point I’m more interested in using AI to aid in exploratory situations or automate tedious investigations, but not leaning much further into AI usage, so any sessions around advanced AI use-cases are not of interest to me. I touch a bit of every domain in my job function, so my recommendations include sessions from a variety of session tracks.
In terms of session level, I swear by the rule of only attending 300 or 400 level sessions, with a strong bias towards 400 level sessions. From past experience at Re:Invent & Re:Inforce my general rule of thumb is if the session is about AWS services or use cases I have worked directly with in production, I try to stick to 400 level session if at all possible, If it’s a service or use case I’ve used lightly or only heard of in AWS certification exams etc, I am open to 300 level sessions. I find the 200-level sessions aren’t appropriate for active builders in AWS, and generally the same depth of content is covered in AWS-published blog posts.
Lastly, in terms of session type, I typically stay away from Breakout sessions simply because they are often posted to Youtube after the conference is over. Additionally, I also stay away from prioritizing Lightning talks as they are often too short to get to the level of detail I want out of sessions. However, if there is a lighting talk conveniently located to another session of interest or I have some time to kill, I often will attend these lighting talks at the conferences, I just don’t prioritize them in pre-conference planning. Lastly, I tend to deprioritize workshops because I simply get too tired at conferences to enjoy sitting in a chair for 2 hours. Don’t get me wrong, I think these workshops have fantastic content, I cannot last for 2 hours on conference venue coffee. With all that said, here are 5 sessions I’m most interested in, along with a few additional bonus sessions I recommend from past conferences:
TDR451: Automate incident response for Amazon EC2 and Amazon EKS
Learn how to streamline incident response using the Automated Forensics Orchestrator solution for Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Elastic Kubernetes Service (Amazon EKS). This session demonstrates how to implement automated workflows triggered by AWS Security Hub findings. Explore implementation prerequisites, customization options, and best practices for enhancing your security operations through automated forensics capabilities. Discover how to standardize response procedures across your Amazon EC2 and Amazon EKS environments. You must bring your laptop to participate.Gone are the days where we're hosting applications directly on EC2s, and the legacy runbacks of isolating EC2 instances and preserving memory don’t hold up in EKS-land. I’m hoping this session can give some pre-built solutions for incident response on isolating and examining specific EKS workloads / pods as it’s been high on my wish list, but difficult to prioritize and scope due to the intricacies of Kubernetes workloads and architecture.
IAM333: From static to dynamic: Modernizing AWS access management
Building a robust AWS identity foundation requires moving beyond static credentials. This session deep dives into proven patterns for implementing dynamic, temporary access across your AWS organization. We'll explore real-world challenges of access key dependencies and share practical approaches to transition towards ephemeral credentials using IAM roles, AWS IAM Identity Center, and SAML federation. Through practical examples and lessons learned, discover how to implement secure authentication patterns that scale while reducing operational overhead. Walk away with actionable strategies to strengthen your identity perimeter and modernize your access management approach.As I’ve grown in my cloud security career I’ve realized there are 3 certainties in life: death, taxes, and product engineers requesting bespoke temporary cloud permissions to “debug X”. We’ve explored other AWS-native solutions before to solve these problems (AWS TEAM, Temporary Elevated Access Broker) but couldn’t get to place that balanced security to our standards and flexibility in defining policies the product engineers need. I’m hoping this session goes beyond what is presented in the TEAM code samples, from the description I’d say it's 50/50 one way or the other.
NIS431: Cloud network defense: Advanced visibility and analysis on AWS
Organizations struggle to maintain comprehensive network visibility in complex cloud environments. This session demonstrates how to implement advanced network monitoring and analysis using AWS security services. Learn to leverage VPC Flow Logs, AWS Network Firewall, and Amazon Detective for deep packet inspection and traffic analysis. Discover practical implementations of AWS Gateway Load Balancer for enhanced inspection and Amazon CloudWatch for real-time monitoring. Walk away with reference architectures and best practices for building robust network visibility solutions that scale across your AWS environment while maintaining performance. Perfect for security teams modernizing their network defense strategy.In late 2023 and into 2024 we overhauled our cloud networking strategy, and this included adding AWS Network Firewall for egress traffic. We’re at the point now where we have logging for monitoring for Network Firewall unexpectedly dropping traffic, but haven’t invested as much for exploratory analysis. In the last year or so, we’ve also been modernizing our AWS multi-account structure, but these projects haven’t yet converged. I’d be eager to attend if this session includes managing network defense in a multi-account set-up.
SEC352: Agentic AI for security: Building intelligent egress traffic controls
Learn to build AI-powered security agents that protect your cloud infrastructure. This hands-on session shows you how to use Amazon Bedrock and Bedrock Agents to create intelligent systems that watch over your network. You'll build Generative AI agents that monitor egress traffic, spot potential threats, and automatically update network firewall to block malicious traffic. Walk away with the skills to implement AI-powered security agents that can reason, decide, and act to protect your cloud infrastructure. You must bring your laptop to participate.This session suggestion may be an indication I’ve spent long enough looking at the session catalog and have accidentally inhaled some of the AI fumes. However, following on from the session recommendation above, I’ve been considering how we can augment our Network Firewall infrastructure for a while. However, as a small team, we haven’t been able to prioritize or explore dynamic rule generation due to internal constraints. So I’m interested to see if any tactics presented in this session spark ideas on how we can incorporate AI to improve our own set-up.
DAP331: Architecting a secrets management strategy that scales
Dive deep into architectural patterns for enterprise secrets management in cloud-native environments. We will dissect the implementation complexities of centralized versus decentralized secrets management and discuss the trade-offs between these patterns, including their impact on developer velocity, security, and operational overhead. Attendees will learn how to leverage AWS services to implement a flexible secrets management strategy and manage secrets lifecycle that balances the needs of developers and security teams. We'll also cover best practices for centralized compliance and auditing regardless of your chosen architecture.Honestly, I’ve never given much thought to what else can be done with secrets in AWS past using Secrets Manager and integrating Secrets Manager resources into EKS clusters using External Secrets Operator. However, the description of this session caught my attention, maybe I’m missing out on some opportunities to improve our secrets posture. That’s one aspect I love about attending conference sessions - being introduced to completely new ideas, tools, and patterns.
And two "bonus" suggestions of sessions I attended at Re:Inforce 2024 that I’m glad to see they’ve brought back in 2025 which I personally recommend:IAM431: A deep dive on IAM policy evaluation
In this chalk talk, learn how policy evaluation works in detail and walk through some advanced AWS Identity and Access Management (IAM) policy evaluation scenarios. Discover how request context is evaluated, explore delegation patterns AWS services use to make requests, understand various condition keys and their optimal use, and receive recommendations for use of each policy type.In 2024 (previously titled “The life of an IAM policy"), the waitlist queue for this session was LONG and many were turned away at the door!. This session gave a unique peek-behind-the-curtain for how requests to AWS services are authenticated and authorized and how AWS thinks about security and blast radius in their internal operations. Will this session be the one you describe to your boss to convince them this conference was worth attending? No. However, this was one of the most interesting AWS talks I’ve ever attended, so for the lore I highly recommend it. Shout out to Scott Piper on the Cloud Security Forum slack group for originally recommending this!
IAM351: Data perimeter challenge
Are you looking to prevent unintended access to your data and mitigate data exposure risks? This hands-on session will demonstrate how data perimeter controls implemented through service control policies (SCPs), resource control policies (RCPs), and VPC endpoint policies can help ensure your corporate data remains within organizational boundaries. You'll build data perimeter policies for real-life security scenarios and validate their effectiveness using an assessment tool. By the end of this session, you'll have gained practical knowledge on how to ensure only trusted identities can access trusted resources from expected networks.In 2024 this session was previously named “Data Perimeter in Action”, however I support the rename because some of the scenarios posed were certainly challenges. What I loved about this session is that it incorporates hands-on learning in a smaller-scale session, giving the perfect mix of engagement and low-time commitment you need when your energy is running low at the end of long conference days. I really appreciated how the examples build on each other and get into the weeds of complex scenarios involving multiple data perimeter controls. Bonus points if this session will be lead by Tatyana Yatskevich - last year their delivery of the content was incredible!