Back to Blog
Exaforce
Industry
December 8, 2025

Lessons from the hallways at my first AWS re:Invent

What hallway conversations and roundtables at re:Invent revealed about real-world cloud security.

My first time at AWS re:Invent was unforgettable. The size and scope were absolutely massive, and many other first-timers expressed the same reaction. Where do you even start, and how do you decide where to spend your time? I decided to keep it simple and focus on the keynotes, along with sessions, and the presentations on detection and incident response.

Naturally, Amazon rolled out some big announcements. New AI capabilities on Bedrock, smarter assistants wired into more services, faster chips, and bigger instances to crunch whatever data you throw at them. The story on stage was very clear. The future is here, if you can wire it up.

The most valuable conversations weren’t on stage

All of that was exciting, but the most useful part of my week had almost nothing to do with the main keynotes. It was sitting around a small table at an incident response meetup, listening to people who actually have to live with this stuff.

Around that table were a senior AWS incident responder with more than a decade of experience, a federal contractor running multi-cloud with just two people on the security team, a European group juggling Splunk and Sentinel, and a parcel carrier from Canada trying to protect public tracking APIs from abuse. And then there was me, listening, asking questions, and trying to control my excitement about Exaforce and what we’re doing in this space.

What practitioners actually want

What struck me was how simple their real wish list was compared to the announcements. They don’t want magic. They want to know which logs they actually need. They want to be confident they are chasing real incidents, not fake “critical” alerts. And they want automation that helps them act faster, without taking production down by accident.

The AWS responder walked through what really matters on the job. CloudTrail management events. The right kind of S3 logging so you can see what left a bucket and who took it. RDS audit logs when data is sensitive. GuardDuty and Security Hub sitting on top, tuned so they only raise their hand when something truly looks off. VPC flow logs are great when a network is broken, but they are almost useless when a board is asking whether anything was exfiltrated.

Automation, with humans still in the loop

On the automation side, the pattern was the same. Everyone liked the idea of agents and runbooks, but nobody wanted a system that isolates production on its own. The comfort zone is human in the loop.

Let the platform pull context, line up the likely root cause, and propose specific actions. Revoke this key. Block that IP address. Move this instance into a quarantine security group. Then let a person approve or decline. Fast and reversible.

A real-world security problem, no AI hype required

The parcel carrier’s story really brought it home. Their biggest issue right now isn’t malware on an endpoint. It’s organized actors hammering a perfectly legitimate public API to build profiles on real people.

They sit at the intersection of privacy, product, and security. Shut everything down, and you break the customer experience. Do nothing, and you hand out sensitive behavioral patterns for free. That conversation had nothing to do with a new chip or a bigger model. It was about posture, application design, and what you can realistically monitor and enforce with a small team.

Builders everywhere, facing similar constraints

Alongside all of this, I had the privilege of being part of the AWS Generative AI Accelerator program. That meant meeting other founders and teams building in very different corners of the world.

One team is using AI to orchestrate fleets of warehouse robots, replanning routes in real time when something breaks. Another is building go-to-market intelligence by pulling signals from sales calls, email threads, and product telemetry so revenue teams can stop guessing which deals matter. Another group is working on AI-assisted quality inspection for industrial equipment, using video feeds from phones on the factory floor.

Totally different markets. Same pattern. Tiny teams, ambitious goals, and a need for leverage that goes far beyond headcount.

Seeing the contrast between the big launches and the hallway conversations was the real lesson. On stage, you hear about limitless scale and new core services. In meetups, you hear how hard it still is to wire the basics together when you have two people, forty accounts, and a constant stream of tickets.

Both stories are true. The gap between them is where companies like ours live.

What this means for Exaforce

For Exaforce, that gap is very clear. Our job is not to replace every tool a customer already uses. It is to plug into the logs and signals that actually matter, and to help teams decide what to care about first. Use AI to automate and prioritize triage, bring back real context from history, and suggest safe actions that map to how teams already work in AWS and in their SIEM. Keep the human in control, but give them ten times more reach.

Leaving re:Invent energized, for the right reasons

I left re:Invent energized, but not because of the announcements. I left excited because I saw a room full of people trying to build practical systems on top of all these new capabilities. Builders in security. Builders in robotics. Builders in go-to-market. Builders in industries I barely understand.

If this is where the ecosystem is today, the next year is going to be a good one for anyone who can turn the firehose into something teams can actually use.

Table of contents

Share

Exaforce What is an AI SOC Anyway Webinar

Recent posts

Customer Story

November 25, 2025

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Research

November 24, 2025

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

Industry

November 11, 2025

How an AI SOC turns Anthropic’s intelligence report into daily defense

Research

November 5, 2025

The log rings don’t lie: historical enumeration in plain sight

Product

October 29, 2025

The past, present, and future of security detections

Exaforce HITRUST award

Product

October 16, 2025

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

Exaforce Blog Featured Image

Industry

October 9, 2025

GPT needs to be rewired for security

Exaforce Blog Featured Image

Product

October 8, 2025

Aggregation redefined: Reducing noise, enhancing context

Exaforce Blog Featured Image

News

Product

October 7, 2025

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Exaforce Blog Featured Image

Research

October 2, 2025

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Exaforce Blog Featured Image

News

September 25, 2025

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

Exaforce Blog Featured Image

Industry

September 24, 2025

How agentic AI simplifies GuardDuty incident response playbook execution

Exaforce Blog Featured Image

Research

September 10, 2025

There’s a snake in my package! How attackers are going from code to coin

Exaforce Blog Featured Image

Research

September 9, 2025

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Exaforce Blog Featured Image

Customer Story

September 3, 2025

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

Exaforce Blog Featured Image

Industry

August 27, 2025

s1ngularity supply chain attack: What happened & how Exaforce protected customers

Exaforce Blog Featured Image

Product

News

August 26, 2025

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Exaforce Blog Featured Image

News

Product

August 26, 2025

Meet Exaforce: The full-lifecycle AI SOC platform

Exaforce Blog Featured Image

Product

August 21, 2025

Building trust at Exaforce: Our journey through security and compliance

Exaforce Blog Featured Image

Industry

August 7, 2025

Fixing the broken alert triage process with more signal and less noise

Exaforce Blog Featured Image

Product

July 16, 2025

Evaluate your AI SOC initiative

Exaforce Blog Featured Image

Industry

July 10, 2025

One LLM does not an AI SOC make

Exaforce Blog Featured Image

Industry

June 24, 2025

Detections done right: Threat detections require more than just rules and anomaly detection

Exaforce Blog Featured Image

Industry

June 10, 2025

The KiranaPro breach: A wake-up call for cloud threat monitoring

Exaforce Blog Featured Image

Industry

May 29, 2025

3 points missing from agentic AI conversations at RSAC

Exaforce Blog Featured Image

Product

May 27, 2025

5 reasons why security investigations are broken - and how Exaforce fixes them

Exaforce Blog Featured Image

Product

May 7, 2025

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Exaforce Blog Featured Image

News

Product

April 17, 2025

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Exaforce Blog Featured Image

Industry

March 16, 2025

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Exaforce Blog Featured Image

Industry

November 6, 2024

Npm provenance: bridging the missing security layer in JavaScript libraries

Exaforce Blog Featured Image

Industry

November 1, 2024

Exaforce’s response to the LottieFiles npm package compromise

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you