Skip to content

Details

Kuala Lumpur AWS fam! ๐Ÿ‘‹ Get ready for an unmissable ๐€๐–๐’ ๐”๐ฌ๐ž๐ซ ๐†๐ซ๐จ๐ฎ๐ฉ ๐Œ๐š๐ฅ๐š๐ฒ๐ฌ๐ข๐š ๐Œ๐ž๐ž๐ญ๐ฎ๐ฉ ๐จ๐ง January 29๐ญ๐ก!

RSVP here and secure your spot to join us for two engaging sessions, along with the opportunity to network with fellow cloud and tech enthusiasts.

Our Community partners are CommVault, AWS, and INIT.

We're looking forward to welcoming you all!

Lightning Talks: We have a Lightning Talk slot everyone is eligible and welcome to take part in it.

Venue
Amazon Web Services
Level 35, The Gardens North Tower, 35 Lingkaran Syed Putra, Mid Valley City, 59200 Kuala Lumpur

Agenda:
| 7:00 pm | Event Start - Registration |
| 7:00 to 7:30 pm | Networking over Food and Drinks |
| 7:30 to 7:40 pm | AWS UG MY Introduction |
| 7:40 to 8:20 pm | Build Multi-Agent AI Collaboration with Amazon Bedrock Agents |
| 8:20 to 8:45 pm | Lightning talk/hiring announcement|
| 8:50 to 9:30 pm | Implementing Zero Trust Natively on AWS|
| 9:30 to 9:40 pm | Group Photo, Networking & Close |

Ehtesham Raza Session:
Description: In this hands-on workshop, youโ€™ll learn how to design and build collaborative multi-agent AI systems using Amazon Bedrock Agents. Instead of relying on a single monolithic model, weโ€™ll explore how multiple specialized AI agents can work togetherโ€”communicating, delegating tasks, and reasoning collectively to solve complex real-world problems.
Youโ€™ll gain practical experience in creating agent roles, defining responsibilities, orchestrating agent interactions, and integrating tools, APIs, and knowledge sources using Amazon Bedrock. By the end of the session, youโ€™ll understand how to build scalable, secure, and production-ready agentic AI architectures on AWS.

Sanket Saxena Session:
Description: This session explores how to design AWS environments using the Zero Trust mindset, starting with the assumption that credentials, networks, or workloads may already be compromised.

We will go beyond theory and break down identity-first security, least-privilege access, and blast-radius reduction using native AWS services.
Youโ€™ll see how IAM, STS, micro-segmentation, and service-level identities replace traditional perimeter security.

Through live demos, we will show how valid credentials can still be blocked, how temporary trust works, and how AWS limits damage during a breach.

Related topics

You may also like