Serverless Solution Provider Day – London
Thank you for registering! You will receive an email confirmation shortly.
Please contact us if you have any questions. We look forward to seeing you soon.
Thank you! You have been added to the wait list. We will notify you via email if a spot opens up.
About the event
Serverless architectures enable developers to express their creativity and to focus on meeting user needs rather than spend time managing infrastructure and looking after servers. In this morning conference, we will hear use cases, discuss architectures, and learn about the industry best practices.
Who should attend
Software Developers, Software engineers, Software architects, IT Managers, systems administrators and CTO’s who are interested in learning more about Serverless Solutions on AWS.
|8:30 AM – 9:15 AM||Breakfast & Welcome|
|9:15 AM – 10:15 AM||
Presenting Vendor: STACKERY
Building serverless applications results in the fastest deployment and iteration path for teams today. However, getting that velocity requires a few changes in the process of building, deploying, managing, and iterating applications from what development teams have done in the past.
This session will be a demonstration of how to build, deploy, and manage serverless applications.
|10:15 AM – 11:15 AM||
Presenting Vendor: EPSAGON
Serverless observability best practices: Cloud-native, and in particular, serverless environments, bring many advantages to software development, but they introduce new monitoring and observability challenges as well. We will take you through the evolution of application architectures and discuss the observability best practices for highly distributed environments.
|11:15 AM – 12:15 AM||
Presenting Vendor: PURESEC
AWS Lambda Security - Your code, your responsibility: Serverless surfaces unique challenges for app security. We will discuss the most critical challenges regarding serverless app security. We will run a live demo of a realistic serverless app containing several common vulnerabilities, and see how attacks exploit them, and how you can secure them.
|12:15 AM||Lunch and Discussion|
Serverless Framework: Serverless Architectures - STACKERY
We'll show you how to:
-Build AWS SAM or serverless.com framework architectures using Stackery's visual editor and YAML template editor. Integrate functions, VPCs, IAM permissions, and CDNs in seconds!
-Create and manage dev, test, and production environments where namespacing, secrets, and more are consistent - so you can focus on collaborating.
-Prepare functions and cloudformation templates for deployment with Stackery and your existing CI/CD process.
Serverless observability best practices - EPSAGON
|Applications today are highly distributed with business workflows and data spread across multiple managed services and APIs.
As a result, measuring performance and cost at the server level is no longer enough — companies need to be application aware.
Observability of such systems is very complicated since each microservice or function is separated and working asynchronously from the others.
Distributed tracing is a key approach to understand such systems.
In this session, we discuss the best practices for full observability of the serverless stack. Participants will learn how to better monitor and troubleshoot issues and better understand how the events in their serverless applications are connected. Real-world examples will be shown, including a live visualization of asynchronous transactions in a highly distributed serverless system.
Serverless Security: AWS Lambda Security - Your code, your responsibility - PURESEC
In cloud-native environments in general, and serverless in particular, the AWS is responsible for securing the underlying infrastructure, from the data centers all the way up to the virtualization and runtime environment. This relieves much of the security burden from the application owner, however, it also poses many unique challenges when it comes to securing the application layer. In this presentation, we will discuss the most critical challenges related to securing serverless applications - from development to deployment. We will also walk through a live demo of a realistic serverless application that contains several common vulnerabilities, and see how they can be exploited by attackers, and how to secure them.