SlideShare a Scribd company logo
1 of 25
BOOSTING NETWORK
SECURITY WITH CHATOPS
Dania Ben Peretz
Product Manager
WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the Attachments tab
Follow us online !
2
marketing@algosec.com
3 | Confidential
POLL #1
ChatOps – have you heard about it?
 No
 Yes
 Yes, but I don’t exactly know what it is
 Yes, and we are using ChatOps in our organization
Please vote using the “Votes“ tab
4 | Confidential
AGENDA
The Rise of Chatbots
01
What is ChatOps?02
What Can ChatOps Do for My
Organization?
03
CONVERSATIONAL FUTURE
5
Web
1995
Applications
2007
Conversational
2019
WHY CHATBOTS HAVE BECOME SO POPULAR
WHY CHATBOTS HAVE
BECOME SO POPULAR
Engaging
App fatigue!
Used on mobile
8 | Confidential
POLL #1
Do you feel your organization is suffering of app-fatigue?
 Yes – there are too many applications in my organization
 No
Please vote using the “Votes“ tab
ENTERPRISES CHALLENGE
There’s an issue with
this application,
who’s its owner?
Server
192.168.52.56 was
compromised –
what are the critical
processes it uses
for?
This server needs
to be taken
down…who should
I speak to?
I need to know the
activity times of this
application server -
we need to migrate it
9
Too many
inquiries
CHATOPS CAN HELP WITH…
Notification Systems
Client runs a plugin/script to
execute it within the chatroom
Real Human Users Various Chatbots
WHAT DOES A CHATOPS ENVIRONMENT LOOK LIKE?
WHERE CHATOPS STEP IN
AlgoBot in Slack
15
AlgoBot in Slack
AlgoBot in Slack
WHERE CHATOPS STEP IN
BUSINESS CONTINUITY
BUSINESS CONTINUITY
WHAT HAVE WE LEARNED?
20 | Confidential
POLL #1
Do you envision your organization deploying and using ChatOps?
 Certainly
 Yes – but only for specific departments
 No
Please vote using the “Votes“ tab
https://www.algosec.com/resources
PPT
21
Video
www.youtube.com/watch?v=2w0PwRdFHYQ
Website
www.algosec.com/algobot/
Q & A
Submit your questions via the chat
Request a Demo: marketing@algosec.com
23
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
ALGOSUMMIT
THE PREMIER EVENT FOR
ALGOSEC CUSTOMERS & CHANNEL PARTNERS
24
EMEA - Lisbon | May 20-23
2019
www.algosec.com/algosummit
UPCOMING WEBINARS
April 24
Firewall Rule Recertification
May 15
Full Hybrid Cloud Survey Report
(CSA)
May 29
Cisco & AlgoSec Joint webinar
THANK YOU!
Questions
marketing@algosec.com

More Related Content

More from AlgoSec

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 

More from AlgoSec (20)

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

2019 04-17 algo sec boosting network security with chatops

Editor's Notes

  1. Thank you and thanks everyone who joined us today for this webinar. Today I’m going to show you a work model called chatops. In the beginning it may seem as if we are talking about the consumers world, but quickly you’ll find out this work model pretty much merges consumers and businesses.
  2. I'd like to open up with this timeline, reflecting our content consumption habits over the network throughout the years. Looking back to the days of web 1.0 when it was “read only”, if you remember names like netscape navigator, sour usage and consumption habits  in the internet came a long way. Ten years ago or so, we focused the consumption around dedicated applications – In the consumers world, It was the first Iphone launch that started it, but also in the enterprises world, this is when applications started multiplying. And this is basically how we still work today. However, we also see, conversational interfaces engaging information from several applications into one platform – a chat platform, where a chatbot or chatbots handle the requests. And according to experts – we are predicted to see and use this interface more and more.
  3. When talking about chatbots, this is not science fiction – all of us probably experienced a short conversation with a chatbot, and many of us use it on a regular basis. In fact, if you think about it – chatbots are almost everywhere. Have you ever asked yourself why have chatbots become so popular? I would say there are many aspects for that. Obviously there’s the emotional aspect- it is very engaging and fun to have someone or some sort of thing replying you on the other side – the engagement experience is what attract users – and mostly, when it is personalized, by the way. Besides that, chatbots are very much used on mobile – something that also enhances the ease of engagement.
  4. So beside those obvious reasons that characterizes really the consumers themselves, there is another rising phenomena that should worry every organization IT manager and it is app fatigue. Clearly in every organization there are important applications that have no substitute, but does the volume of work with each application equals to all employees? Did you happen to experience an application adoption that literally failed in your organization? Are you familiar with the feeling of – auhh, why do I need this from that application, and another thing I can only get with that one? It’s clear that consumers are suffering from “app fatigue”, remember this: your employees, partners, and suppliers are consumers too. Statistics say: In the mobile world Most of the people can sum up their usage in up to 5 apps There are significantly less downloads of apps with every passing month And, In the B2B segment - 1/3 of enterprise apps will fail in the coming 6 months. So in fact while the concept of app fatigue has its roots in the consumer mobile space, it has become legitimate concern for enterprise IT leaders. 
  5. OK so when talking about Enterprise challenges to deliver under short time in a tangled supply chain, we obviously have the aspect of app fatigue  But we also have the challenge of collaborating all the relevant stakeholders, especially in extra large organizations
  6. Let’s take for an easy example IT manager who has a queue of many tickets to handle, opened up by different employees The duration of handling is not always known, and this often puts a load on the IT department, replying to people asking for the status of their request. A solution that seem to work very well is – chatops.
  7. So what is chatops? ChatOps is actually the use of chat clients to facilitate how different operation tasks along with software development related tasks are communicated and executed. In a ChatOps environment, the chat client serves as the primary communication channel for ongoing work. The chatops environment involvs human users, chatbots and different real-time communication tools. Enterprises that adopted the chatops model, confirm that with the use of chatops, they significantly improved information sharing and tightened up the feedback loop and between the different departments and stakeholders.
  8. With ChatOps, you can bring teams together in ways email and instant messaging apps never could, The benefits of the use of chatops are many. Starting from the social ones, where the general collaboration is increased. Actually – the entire domain of knowledge sharing is increased, so imagine a new employee assimilation process that is common to every organization, it is a pretty awkward and obviously time-consuming process. How convenient it would be for a new employee to ask at a chat where he or she can find certain materials, where there are instructions, who should he or she get in touch with regarding different matters and get an istant response. There’s no doubt it sounds really efficient, right? Well it is pretty much already a reality. So this was an example of a single process that can be speed up by chatops, but there are many other processes and technical benefits. Think of a process that is subjected to many approvals of different stakeholders. The chatops can help with a synchronized communication, Increased speed of actions and executed commands. Not only that, I did not mention the costs that are being cut where you involve automatic alerts and chatbots response instead of a human rep. Let’s get back to our IT manager who deals with the resolution of many tickets. A notification system in a chatroom can really take off the load of responding to each one in which handling phase their ticket is. ______________________________________________________________________ Social benefits Increased collaboration Increased sharing of domain knowledge Increased visibility and awareness Enhanced learning Improved empathy Process and technical benefits Increased automation Increased speed of actions and executed commands Improved security and safety Automatic logging of conversations and actions Synchronous communication Reduction in email
  9. The number of enterprises that are not affected by regulations is shrinking. But even if you do not have to comply with specific government or industrial regulations and security standards, it is now commonplace to conduct regular, thorough audits of your firewalls. Not only do these audits ensure that your firewall configurations and rules meet the proper requirements of external regulations or internal security policy, but these audits can also play a critical role in reducing risk and actually improve firewall performance by optimizing the firewall rule base.
  10. So in this security incident chatroom, or channel, which is slack’s terminology, we see that Sue, notifies on a new detection of a security breach. Just so you know, statistics say, it takes an average of 2-7 days to respond to an attack so time here is crucial. With ChatOps, you can see, that a moment later, the organization’s security admin, checks with AlgoBot – the AlgoSec Security Management Suite chatbot, if the allegedly compromised server is A. involved in critical business process and B. indeed exposed to the internet in order to check if isolation is required. As this server is critical, and time here is crucial, we understand how important is the balance between security to business continuity. This is how chatops step in to speed up and close those cycles. So What’s next?
  11. You can also use this chat to get things done, meaning, to actually block this server. As you can see in the chat, upon request, AlgoBot communicates on the behalf of the requestor with the AlgoSec Security Management suite,and creates the change request. AlgoBot, communication with the AlgoSec security management suite is based on using simple APIs.
  12. Speaking of business continuity, here is another case chatops steps in. IT maintenance requires finding suitable timeslot, and, of course, getting multiple approvals for that. In the IT slack channel, you can simply get all the relevant stakeholders answers, and accelerate the response duration by getting from AlgoBot the business context and implication of the planned downtime. Using BusinessFlow APIs, algobot retrieves the designated server’s associated applications. I’d like to remind, that in BusinessFlow, an application is a set of connections between different addresses.
  13. That way, as we can see – algobot knows which applications are related to which server. This specific server is used by a business critical application. Therefore, its maintenance need to be carefully planned. Chatops will help with further coordinating it.
  14. So what have we learned from those examples. There’s already out there a bright, easy to deploy solution, called chatops. It can help your organization’s communication and collaboration and speed up not only security and IT processes, but many other processes. Organizations indeed confirm the chatops model demonstrated improved agility across many of their departments. I would like now, to use this time and get to our final poll, and question you, our audience…
  15. What are the departments you think that should take part in a chatops environment, as you imagine it.
  16. AlgoSec has a full line up of resources in our website, we welcome you to learn more about our offering by reading Link to Prof. Wool’s Educational Whiteboard courses Link to our Resources and upcoming webinars Link to follow us on LinkedIn
  17. Now, let’s open up the floor for some Q & A questions. Seed questions: Q: Seems like chatops may expose some people in the organization to information they are not allowed to see, such as firewalls rules. How is this handled with chatops? A: Alongside with permissions of data, that should be implemented as impersonation of the chatbot itself, this is pretty much up to who sets up the chatrooms. Q: Is chatops considered regulatory compliant? A: Because it supplies a real-time and historical log of activities in the environment, a ChatOps approach also supports regulatory compliance and security efforts..
  18. We welcome you to connect with us through our social networks in LinkedIn, Facebook, Twitter and our blog.
  19. And, before we part – AlgoSummit and Upcoming webinars