As government agencies expand the use of cloud services, security continues to be a top priority for program managers, policymakers, and cloud service providers (CSPs). Governments and agencies worldwide are moving workloads with varying levels of sensitivity to the cloud. This session will feature agency-level security risk management practices and address common myths about security in the cloud. Participants will gain insight into how governments are leveraging cloud computing to improve their security posture and more quickly benefit from economies of scale.
Mark Ryland, Chief Solutions Architect, Amazon Web Services, WWPS
Next Generation Education: Technology in the Classroom and BeyondAmazon Web Services
The implementation of highly scalable, easy-to-deploy technology is radically transforming educational models and student engagement. For education, the cloud offers not only cost savings and agility, but the opportunity to develop breakthroughs in research, accelerate learning, enhance educational models, and increase student engagement. The “always-up, always-on" infrastructure supports next generation education. Learn the practical strategies being deployed by venerable universities and startup educational technology companies for breaking down barriers to delivering content, accessing information, and overcoming economics to meet students where they are. This session will highlight how cloud can accelerate breakthroughs in educational models and learning outcomes by providing on-demand access to powerful computing.
Vincent Quah, Business Development Lead for the Education, Research and Not For Profit , Amazon Web Services, WWPS APJ
As cloud services deployment matures in the enterprise, the emphasis has moved from deploying infrastructure as a service towards a model of delivering business services in a “SaaS-like” manner. How can organizations succeed in building hybrid technology models which effectively leverage AWS to deliver business services transparently to customers? In this presentation, we will discuss how use AWS and CSC to develop business services starting with hybrid IT, moving toward robust test and development strategies for enterprise applications, and finally providing a true “SaaS-like” experience for business users and customers alike.
Craig Stires, Head of Big Data and Analytics, Amazon Web Services, APAC
Dan Angelucci, Chief Technology Officer - Asia, Middle East and Africa, CSC
While security is a top concern in every organization these days, it often gets a bad rap. In many minds, security has the reputation of the bothersome villain who attempts to hinder performance or restrain agility. In this session we will outline four strategies to protect your valuable workloads, without falling into traditional security traps. We will walk through three stories of EC2 security superheroes who saved the day by overcoming compliance and design challenges, using a (not so) secret arsenal of AWS and Trend Micro security tools.
Andrew Watts-Curnow, Solutions Architect, Amazon Web Services, ASEAN
Justin Foster, CISSP Head of Cloud Workload Security, Trend Micro
Governments around the world are taking advantage of cloud not only to reduce costs, but to transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government are facing budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency; all while reducing costs. The session will highlight the transformative impact of cloud architectures, practical strategies being deployed by governments worldwide to break down innovation barriers, and tackle mission-critical operations with the cloud.
Peter Moore, Regional Managing Director, Amazon Web Services, WWPS APJ
Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today’s complex applications in order to keep pace with business demands. Our upcoming webinar will discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment.
Join us to learn:
• How to migrate from traditional on-premises data centers to AWS with confidence
• How to improve the monitoring and troubleshooting of modern applications
• How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS
Who should attend: Developers, DevOps Director/Manager, IT Operations Director/Manager, Director of Cloud/Infrastructure, VP of Engineering
AWS provides enterprises numerous ways to migrate to the cloud, based on your business needs. Because AWS was built with the most data-sensitive, regulated industries in mind, enterprises have access to the most robust networking and security controls to safeguard a protected and seamless migration. In this session, AWS security professionals provide an overview of what security essentials you need to consider when migrating to the cloud. We will also provide a compliance update on what you need to consider in relation to regulatory issues.
Next Generation Education: Technology in the Classroom and BeyondAmazon Web Services
The implementation of highly scalable, easy-to-deploy technology is radically transforming educational models and student engagement. For education, the cloud offers not only cost savings and agility, but the opportunity to develop breakthroughs in research, accelerate learning, enhance educational models, and increase student engagement. The “always-up, always-on" infrastructure supports next generation education. Learn the practical strategies being deployed by venerable universities and startup educational technology companies for breaking down barriers to delivering content, accessing information, and overcoming economics to meet students where they are. This session will highlight how cloud can accelerate breakthroughs in educational models and learning outcomes by providing on-demand access to powerful computing.
Vincent Quah, Business Development Lead for the Education, Research and Not For Profit , Amazon Web Services, WWPS APJ
As cloud services deployment matures in the enterprise, the emphasis has moved from deploying infrastructure as a service towards a model of delivering business services in a “SaaS-like” manner. How can organizations succeed in building hybrid technology models which effectively leverage AWS to deliver business services transparently to customers? In this presentation, we will discuss how use AWS and CSC to develop business services starting with hybrid IT, moving toward robust test and development strategies for enterprise applications, and finally providing a true “SaaS-like” experience for business users and customers alike.
Craig Stires, Head of Big Data and Analytics, Amazon Web Services, APAC
Dan Angelucci, Chief Technology Officer - Asia, Middle East and Africa, CSC
While security is a top concern in every organization these days, it often gets a bad rap. In many minds, security has the reputation of the bothersome villain who attempts to hinder performance or restrain agility. In this session we will outline four strategies to protect your valuable workloads, without falling into traditional security traps. We will walk through three stories of EC2 security superheroes who saved the day by overcoming compliance and design challenges, using a (not so) secret arsenal of AWS and Trend Micro security tools.
Andrew Watts-Curnow, Solutions Architect, Amazon Web Services, ASEAN
Justin Foster, CISSP Head of Cloud Workload Security, Trend Micro
Governments around the world are taking advantage of cloud not only to reduce costs, but to transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government are facing budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency; all while reducing costs. The session will highlight the transformative impact of cloud architectures, practical strategies being deployed by governments worldwide to break down innovation barriers, and tackle mission-critical operations with the cloud.
Peter Moore, Regional Managing Director, Amazon Web Services, WWPS APJ
Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today’s complex applications in order to keep pace with business demands. Our upcoming webinar will discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment.
Join us to learn:
• How to migrate from traditional on-premises data centers to AWS with confidence
• How to improve the monitoring and troubleshooting of modern applications
• How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS
Who should attend: Developers, DevOps Director/Manager, IT Operations Director/Manager, Director of Cloud/Infrastructure, VP of Engineering
AWS provides enterprises numerous ways to migrate to the cloud, based on your business needs. Because AWS was built with the most data-sensitive, regulated industries in mind, enterprises have access to the most robust networking and security controls to safeguard a protected and seamless migration. In this session, AWS security professionals provide an overview of what security essentials you need to consider when migrating to the cloud. We will also provide a compliance update on what you need to consider in relation to regulatory issues.
Amazon Web Services offers a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. Amazon Web Services provides security-specific tools and features across network security, configuration management, access control and data security. In addition, Amazon Web Services provides monitoring and logging tools to provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that Amazon Web Services offers, and the latest security innovations coming from Amazon Web Services.
Andrew Watts-Curnow, Cloud Architect - Professional Services, ASEAN
Running Mission Critical Workload for Financial Services Institutions on AWSAmazon Web Services
In this session we will walk through practical examples of how Financial Services Institutions (FSI) operate both common workloads and mission critical applications on AWS. Through real customer examples, we will show you how to leverage the AWS cloud platform to make your application more resilient, reliable and cost effective while increasing your visibility. You will also learn how FSI’s deploy, architect and secure their workloads on AWS and how to leverage platform features to extend and integrate your existing infrastructure with AWS.
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
Hosting workloads on AWS provides organizations with agility, speed, efficiency, and reduced costs. Check Point vSEC further enhances this experience by delivering advanced, multi-layered threat prevention security for your AWS workloads, protecting assets and enabling secure connectivity from enterprise networks to your AWS resources. Register for our upcoming webinar to learn how Check Point vSEC on AWS provided customers with an advanced threat prevention solution to enable secure application delivery. Learn how to migrate your applications and workloads to AWS with vSEC’s comprehensive security solution tailored to help protect your cloud environment.
Join us to learn:
• How Check Point vSEC enabled customers to confidently migrate from an on-premises infrastructure to AWS
• How to prevent network attacks and data breaches when hosting workloads in a cloud-based environment
• How Courtagen Life Sciences secured their cloud environment to maintain compliance, reduce IT expenses and leverage the full capabilities of the AWS Cloud
Who should attend:
IT Admins, Security Admins, Cloud Admins, Business Decision Makers, Compliance & governance officers, Line of Business leaders, DevOps engineers & architects
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsAmazon Web Services
Local and regional governments around the world are using the cloud to transform services, improve their operations, and reach new horizons for citizen services. People are more connected to each other than ever before, and the increased connectivity of devices creates new opportunities for the public sector to truly become hubs of innovation, driving technology solutions to help improve citizens' lives. This session highlights how AWS IoT enables applications to communicate with all of your devices, all the time, even when they aren’t connected, with the goal of driving cost savings, innovation, and enhanced decision making for smarter cities. You will learn how governments are accessing the data generated from IoT applications for innovation in areas such as improved citizen requests and service delivery across government.
Mark Ryland, Chief Solutions Architect, Amazon Web Services, WWPS
How We end the Walking Dead in the Enterprise - Session Sponsored by VersentAmazon Web Services
We've all experienced it; attempt after attempt to bring contemporary transformation to the workplace, only to be attacked by 'the old guard' of the technology landscape. In 2016, companies are learning that many old methods/processes/technologies have zombified, or are already infected and dying. Old world solutions, powered by the fear of the new, the uncertainty of change and the doubt that it will scale, are quickly limiting companies by their inability to rapidly change.
However a growing numbers of CIO's, and leadership teams have embraced the 'full stack' revolution and are reaping the benefits of true Mode 2 transformation. We'd like to share some insight from real world customers who've built 'new world' material ecosystems that stands the rigour of these internal and external threats. Leaders and technologists who've leaned into change and avoided becoming another member of 'the walking dead'.
Topics Include:
Strategies to deliver elastic, utility cloud across your enterprise.
Square peg, round hole & your Operating Model – Mode 2.
Don't bypass Service Management – (hint: it's not faster). Tips & Tricks.
Belligerent, aggressive automation – JDI.
Tales from the Battlefield – a real world example.
Speaker: Thor Essman, CEO, Versent & James Coxon, GM, Cloud & Digital, Founder, Versent
Cloud Migration for Financial Services - Toronto - October 2016Amazon Web Services
Presented by Cloud Technology Partners. Robert Christiansen presents us best practices for cloud adoption, taking us on the journey from a single application on the cloud, through hybrid cloud, culminating with a Cloud First Approach.
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...Amazon Web Services
Cloud technology has made enterprise-wide digital transformation an achievable reality, even for the largest financial services companies. Organizations can now rearchitect operating models to improve the way they interact with customers, regulators, employees and service partners. It is also opening avenues to experiment with innovations like IoT, blockchain and machine learning, among others. However, a common misperception is blocking adoption for many organizations: on-premise IT infrastructure is more secure than the cloud. The reality is financial services organizations migrating to the cloud have access to some of the most innovative security technologies on the market today—systems so robust that they would cost millions of dollars to build in-house. In this session, you will hear an overview of how cloud-enabled programs can enhance your organization’s security postures and make you more secure than your on-premise status.
Running solutions in Amazon Web Services can help you get your applications up and running faster. By harnessing the power of the Amazon Web Services platform services you no longer have to focus on the underlying infrastructure, but instead you can focus on your application and business logic. This session will enable you to learn about the rich array of Amazon Web Services platform services available, find out how other customers are leveraging platform services and identify which services are relevant to your business. This session also includes a demonstration of Amazon Web Services for compute, database and deployment which you can use to accelerate your cloud adoption journey.
Mark Statham, Senior Cloud Architect - Professional Services, Amazon Web Services, ASEAN
During this session we will describe common methods used to create a Hybrid Cloud with Amazon Web Services. We will step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Mark Statham, Senior Cloud Architect - Professional Services, Amazon Web Services, ASEAN
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdfAmazon Web Services
You are quickly building and deploying exciting services on top on the AWS Cloud. As your deployment matures, you start to understand how each of these services has it's own unique challenges when it comes to operations and security.
Making sure that the diversity available in AWS services doesn't increase the operational burden on your teams is a significant challenge. If you don't use the right strategy, you risk implementing a unique security approach for each service.
In this talk we'll look at an overall security strategy for your deployment pulled from the real-world experiences of some of the top companies around the world. This strategy along with services like AWS Lambda can provide a unified view of your deployment and automatically respond to incidents… regardless of scale.
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
The cloud is transforming the way businesses deploy and manage applications. Organizations are increasingly deploying and migrating applications to public and private clouds primarily to drive agility, operational efficiency and cost savings.
While we all recognize the benefits of Cloud, the fact is that there are significant differences between how an application runs in a public IaaS provider data center designed for multiple tenants and how it runs in your private enterprise datacenter.
Whether applications are revenue generating or critical business apps, they must ensure the same great user experience, including across associated availability, performance, and security services. However, there are challenges that need to be addressed, including determining which workloads are suitable for the cloud due to the inherent design of cloud data centers, the application delivery and security capabilities of each cloud provider, and the overall lack of visibility and control.
Attend F5 Networks presentation session to learn how App-Centric Strategy provides the critical services to make your business applications GO SMARTER. FASTER. SAFER whether you’re planning to architect a public cloud, private cloud, hybrid cloud, deploy or re-architect your apps, or migrate to SaaS.
Hybrid Cloud – Enabling a Borderless Data Center for Your BusinessAmazon Web Services
Using Megaport's API or online portal to order, provision, and scale bandwidth in less than a minute
Tips and suggestions on setting up a redundant network to AWS
How to expose your AWS-based offerings via Megaport's ecosystem and it's global list of users
How to increase your throughput, achieve network consistency, and increase security of your data through direct connectivity
Derek Ewell, Partner Solutions Architect, Amazon Web Services, ASEAN
Matt Simpson, Head Of Global Cloud Strategy, Megaport
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
Jodi Scrofani
Global Financial Services Compliance Strategist for AWS takes us on a journey of Security and Compliance mechanisms, that are mandatory in the Financial Services Industry, and explains how they are addressed by customers today on the AWS Cloud. She explains the AWS Shared Security Model, gives a detailed overview of audit and certifications achieved by AWS, and shows best practices and steps that FSI customers should take to ensure compliance and security.
Demys&fying
Cloud
Security
J o u r n e y
f r o m
P r o j e c t
t o
P a t e n t
t o
P u b l i c
C o n s u m p & o n
Platform as a Service
Software as a Service Database as a Service Load Balancing as a Service
Monitoring as a Service
Central Access Control as a Service
Infrastructure as a Service
Notification as a Service
Validation as a Service
Health Information Exchange as a Service
NetStor DRaaS for Oracle Public Cloud é a solução abrangente de alta disponibilidade e recuperação de desastres da NetStor Tecnologia e Serviços, para servidores Windows e Linux que protege seu negócio de inatividade e perda de dados. Replica dados, aplicações ou servidores inteiros, de forma eficiente e segura, a qualquer distância, para um ambiente de Disaster Recovery como serviço ou DRaaS hospedado na Oracle Public Cloud, permitindo recuperação rápida e fácil, após uma falha, em questão de minutos ou segundos a um custo 3 a 4 vezes menor que em uma abordagem tradicional de DR.
Amazon Web Services offers a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. Amazon Web Services provides security-specific tools and features across network security, configuration management, access control and data security. In addition, Amazon Web Services provides monitoring and logging tools to provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that Amazon Web Services offers, and the latest security innovations coming from Amazon Web Services.
Andrew Watts-Curnow, Cloud Architect - Professional Services, ASEAN
Running Mission Critical Workload for Financial Services Institutions on AWSAmazon Web Services
In this session we will walk through practical examples of how Financial Services Institutions (FSI) operate both common workloads and mission critical applications on AWS. Through real customer examples, we will show you how to leverage the AWS cloud platform to make your application more resilient, reliable and cost effective while increasing your visibility. You will also learn how FSI’s deploy, architect and secure their workloads on AWS and how to leverage platform features to extend and integrate your existing infrastructure with AWS.
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
Hosting workloads on AWS provides organizations with agility, speed, efficiency, and reduced costs. Check Point vSEC further enhances this experience by delivering advanced, multi-layered threat prevention security for your AWS workloads, protecting assets and enabling secure connectivity from enterprise networks to your AWS resources. Register for our upcoming webinar to learn how Check Point vSEC on AWS provided customers with an advanced threat prevention solution to enable secure application delivery. Learn how to migrate your applications and workloads to AWS with vSEC’s comprehensive security solution tailored to help protect your cloud environment.
Join us to learn:
• How Check Point vSEC enabled customers to confidently migrate from an on-premises infrastructure to AWS
• How to prevent network attacks and data breaches when hosting workloads in a cloud-based environment
• How Courtagen Life Sciences secured their cloud environment to maintain compliance, reduce IT expenses and leverage the full capabilities of the AWS Cloud
Who should attend:
IT Admins, Security Admins, Cloud Admins, Business Decision Makers, Compliance & governance officers, Line of Business leaders, DevOps engineers & architects
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsAmazon Web Services
Local and regional governments around the world are using the cloud to transform services, improve their operations, and reach new horizons for citizen services. People are more connected to each other than ever before, and the increased connectivity of devices creates new opportunities for the public sector to truly become hubs of innovation, driving technology solutions to help improve citizens' lives. This session highlights how AWS IoT enables applications to communicate with all of your devices, all the time, even when they aren’t connected, with the goal of driving cost savings, innovation, and enhanced decision making for smarter cities. You will learn how governments are accessing the data generated from IoT applications for innovation in areas such as improved citizen requests and service delivery across government.
Mark Ryland, Chief Solutions Architect, Amazon Web Services, WWPS
How We end the Walking Dead in the Enterprise - Session Sponsored by VersentAmazon Web Services
We've all experienced it; attempt after attempt to bring contemporary transformation to the workplace, only to be attacked by 'the old guard' of the technology landscape. In 2016, companies are learning that many old methods/processes/technologies have zombified, or are already infected and dying. Old world solutions, powered by the fear of the new, the uncertainty of change and the doubt that it will scale, are quickly limiting companies by their inability to rapidly change.
However a growing numbers of CIO's, and leadership teams have embraced the 'full stack' revolution and are reaping the benefits of true Mode 2 transformation. We'd like to share some insight from real world customers who've built 'new world' material ecosystems that stands the rigour of these internal and external threats. Leaders and technologists who've leaned into change and avoided becoming another member of 'the walking dead'.
Topics Include:
Strategies to deliver elastic, utility cloud across your enterprise.
Square peg, round hole & your Operating Model – Mode 2.
Don't bypass Service Management – (hint: it's not faster). Tips & Tricks.
Belligerent, aggressive automation – JDI.
Tales from the Battlefield – a real world example.
Speaker: Thor Essman, CEO, Versent & James Coxon, GM, Cloud & Digital, Founder, Versent
Cloud Migration for Financial Services - Toronto - October 2016Amazon Web Services
Presented by Cloud Technology Partners. Robert Christiansen presents us best practices for cloud adoption, taking us on the journey from a single application on the cloud, through hybrid cloud, culminating with a Cloud First Approach.
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...Amazon Web Services
Cloud technology has made enterprise-wide digital transformation an achievable reality, even for the largest financial services companies. Organizations can now rearchitect operating models to improve the way they interact with customers, regulators, employees and service partners. It is also opening avenues to experiment with innovations like IoT, blockchain and machine learning, among others. However, a common misperception is blocking adoption for many organizations: on-premise IT infrastructure is more secure than the cloud. The reality is financial services organizations migrating to the cloud have access to some of the most innovative security technologies on the market today—systems so robust that they would cost millions of dollars to build in-house. In this session, you will hear an overview of how cloud-enabled programs can enhance your organization’s security postures and make you more secure than your on-premise status.
Running solutions in Amazon Web Services can help you get your applications up and running faster. By harnessing the power of the Amazon Web Services platform services you no longer have to focus on the underlying infrastructure, but instead you can focus on your application and business logic. This session will enable you to learn about the rich array of Amazon Web Services platform services available, find out how other customers are leveraging platform services and identify which services are relevant to your business. This session also includes a demonstration of Amazon Web Services for compute, database and deployment which you can use to accelerate your cloud adoption journey.
Mark Statham, Senior Cloud Architect - Professional Services, Amazon Web Services, ASEAN
During this session we will describe common methods used to create a Hybrid Cloud with Amazon Web Services. We will step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Mark Statham, Senior Cloud Architect - Professional Services, Amazon Web Services, ASEAN
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdfAmazon Web Services
You are quickly building and deploying exciting services on top on the AWS Cloud. As your deployment matures, you start to understand how each of these services has it's own unique challenges when it comes to operations and security.
Making sure that the diversity available in AWS services doesn't increase the operational burden on your teams is a significant challenge. If you don't use the right strategy, you risk implementing a unique security approach for each service.
In this talk we'll look at an overall security strategy for your deployment pulled from the real-world experiences of some of the top companies around the world. This strategy along with services like AWS Lambda can provide a unified view of your deployment and automatically respond to incidents… regardless of scale.
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
The cloud is transforming the way businesses deploy and manage applications. Organizations are increasingly deploying and migrating applications to public and private clouds primarily to drive agility, operational efficiency and cost savings.
While we all recognize the benefits of Cloud, the fact is that there are significant differences between how an application runs in a public IaaS provider data center designed for multiple tenants and how it runs in your private enterprise datacenter.
Whether applications are revenue generating or critical business apps, they must ensure the same great user experience, including across associated availability, performance, and security services. However, there are challenges that need to be addressed, including determining which workloads are suitable for the cloud due to the inherent design of cloud data centers, the application delivery and security capabilities of each cloud provider, and the overall lack of visibility and control.
Attend F5 Networks presentation session to learn how App-Centric Strategy provides the critical services to make your business applications GO SMARTER. FASTER. SAFER whether you’re planning to architect a public cloud, private cloud, hybrid cloud, deploy or re-architect your apps, or migrate to SaaS.
Hybrid Cloud – Enabling a Borderless Data Center for Your BusinessAmazon Web Services
Using Megaport's API or online portal to order, provision, and scale bandwidth in less than a minute
Tips and suggestions on setting up a redundant network to AWS
How to expose your AWS-based offerings via Megaport's ecosystem and it's global list of users
How to increase your throughput, achieve network consistency, and increase security of your data through direct connectivity
Derek Ewell, Partner Solutions Architect, Amazon Web Services, ASEAN
Matt Simpson, Head Of Global Cloud Strategy, Megaport
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
Jodi Scrofani
Global Financial Services Compliance Strategist for AWS takes us on a journey of Security and Compliance mechanisms, that are mandatory in the Financial Services Industry, and explains how they are addressed by customers today on the AWS Cloud. She explains the AWS Shared Security Model, gives a detailed overview of audit and certifications achieved by AWS, and shows best practices and steps that FSI customers should take to ensure compliance and security.
Demys&fying
Cloud
Security
J o u r n e y
f r o m
P r o j e c t
t o
P a t e n t
t o
P u b l i c
C o n s u m p & o n
Platform as a Service
Software as a Service Database as a Service Load Balancing as a Service
Monitoring as a Service
Central Access Control as a Service
Infrastructure as a Service
Notification as a Service
Validation as a Service
Health Information Exchange as a Service
NetStor DRaaS for Oracle Public Cloud é a solução abrangente de alta disponibilidade e recuperação de desastres da NetStor Tecnologia e Serviços, para servidores Windows e Linux que protege seu negócio de inatividade e perda de dados. Replica dados, aplicações ou servidores inteiros, de forma eficiente e segura, a qualquer distância, para um ambiente de Disaster Recovery como serviço ou DRaaS hospedado na Oracle Public Cloud, permitindo recuperação rápida e fácil, após uma falha, em questão de minutos ou segundos a um custo 3 a 4 vezes menor que em uma abordagem tradicional de DR.
Data Privacy & Compliance Considerations on Using Cloud ServicesAmazon Web Services
Learn about the factors organization should consider when hosting data in Cloud. What are the risks, benefits and implications for data protection and privacy when moving to the business data and applications to cloud?
All the essential information you need about DLP in one eBook.
As security professionals struggle with how to keep up with threats, DLP - a technology designed to ensure sensitive data isn't stolen or lost - is hot again. This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
What's Inside:
-The seven trends that have made DLP hot again
-How to determine the right approach for your organization
-Making the business case to executives
-How to build an RFP and evaluate vendors
-How to start with a clearly defined quick win
-Straight-forward frameworks for success
Demystifying Cloud Economics - How to Build an Investment Case for Scale Migr...Amazon Web Services
While Cloud is fast becoming the new normal for organisations of all sizes, many IT executives & budget owners struggle to articulate the business value of moving to the Cloud in terms that resonate with the Board and broader C suite. In this session, we will talk through the impact cloud computing is having on the overall IT cost base, not just the infrastructure layer. We will also cover what the typical non-cost benefits are, and how they can be measured and communicated. Finally we will provide a framework that can be used to calculate the transformation costs associated with moving to Cloud.
Speaker: Conor McNamara, Head of Cloud Economics and Enterprise Strategy, Asia Pacific, Amazon Web Services
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
Getting Started with Managed Services | AWS Public Sector Summit 2016Amazon Web Services
The AWS cloud infrastructure is architected to be one of the most flexible and secure cloud computing environments available today. By leveraging services such as EC2, you are able to build highly scalable and performant architectures. AWS also provides a rich set of services which help to remove much of the potentially undifferentiated heavy lifting associated to managing your EC2 based infrastructure. This session will introduce some of these services in the areas of Application Management, Database, Analytics, Security and Enterprise Applications.
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...Amazon Web Services
While cloud is fast becoming the new normal for organisations of all sizes, many IT executives & budget owners still struggle to articulate the business value of moving to the cloud in terms that resonate with the Board and Broader C suite. In this session, we will talk through the impact cloud computing is having on the overall IT cost base, not just the infrastructure layer. We will also cover what the typical non-cost benefits are, how they can be measured and communicated. Finally we will provide a framework that can be used to calculate the transformation costs associated with moving to the cloud.
Blair Layton, Business Development Manager – Database Services, Amazon Web Services, APAC
Managing Security with AWS | AWS Public Sector Summit 2017Amazon Web Services
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy environments. We will take a look at innovative ways customers are using AWS to manage security more efficiently. After attending this session, you will be familiar with the shared security responsibility model and ways you can inherit security controls from the rich compliance and accreditation programs maintained by AWS. Learn More: https://aws.amazon.com/government-education/
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth.
In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture.
This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
Threats are evolving and emerging every day. PagerDuty needed to take a more proactive and efficient stance to monitor, investigate and triage threats and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for PagerDuty to gain end-to-end visibility across their cloud environment. In this webinar, you’ll learn how PagerDuty gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk on AWS.
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
Organizations that are transitioning from a traditional data center to an on-demand IT environment, such as AWS, are quickly finding that automating and scaling legacy security services for comprehensive workload security can be challenging. In light of these challenges, it is necessary to deploy a security solution that employs the same versatility and elasticity as the cloud workloads it is meant to protect. CloudPassage® Halo® provides virtually instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds like AWS. Join Xero and CloudPassage to learn about best practices for migrating your security workloads to the cloud.
Join us to learn:
- Best practices for maintaining workload security
- How you can align cloud security deployment methods with on-premises deployment methods
- Key considerations for architecting your infrastructure to scale quickly and securely
Who should attend: CTOs, CIOs, CISOs, Directors and Managers of Security, IT Administers, IT Architects and IT Security Engineers
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
More and more manufacturers have been investing in cloud technology these days, but there is still a contingent of businesses who don’t see the appeal, or are concerned about the risks. In a recent MBT survey about cloud adoption, 50 percent of those manufacturers not using cloud computing said they didn’t because of security concerns. But are these concerns actually justified, or are businesses leaving opportunity on the table due to glaring misconceptions?
This slideshow is a brief introduction to a complex topic which is evolving constantly. It is not meant for security professionals but built for those people discovering public cloud.
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
Clarke Rodgers (CISO, SCOR Velogica)'s presentation on SCOR's journey to SOC2/TYPE2 via AWS at the NYC Alert Logic Cloud Security Summit on June 14th, 2016.
Security in Clouds: Cloud security challenges – Software as a
Service Security, Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet devices and the cloud. Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for Google App Engine.
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
Splunk® offers a leading platform for Operational Intelligence, enabling AWS users to look closely at machine data and gain actionable insights that can help make your organization more productive, profitable, competitive, and secure. Join us to learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Learn how Splunk and AWS together can provide the end-to-end visibility needed to respond proactively and as quickly as possible to rapidly evolving security environments.
Speakers:
David Wall, Country Manager ANZ & Head of Asia Pacific & Japan & Arup Chakrabarti, Director of Engineering - Pager Duty
Myles Hosford, Security Solution Architect - AWS
Richard Smith, Strategic Alliances - Splunk
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
- Cloud security is just security. An evolution
- 3 Stages of Digital Transformation
- A new security model
- Security model in AWS
- Automate with integrated services
- AWS security solutions
- Barriers and common seen practices
- “Unboxing” cloud network security
- Cloud-Native Network Security Service
AWS Webcast - Emergency Preparedness and Interagency Collaboration Webinar Amazon Web Services
Learn how the AWS cloud can cost effectively provide the scalable computing resources, storage services, and analytic tools that enable running different kinds of Emergency Preparedness and Collaborative workloads.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. Security is Job Zero at AWS
Network
Security
Physical
Security
Platform
Security
People &
Procedures
3. AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network, & Firewall Configuration
Customer applications & contentCustomers
Security & compliance is a shared responsibility
Customers have
their choice of
security
configurations IN
the Cloud
AWS is
responsible for
the security OF
the Cloud
4. Build everything on a constantly monitored and audited,
constantly improving security baseline
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
AWS is
responsible for
the security OF
the Cloud
GxP
ISO 13485
AS9100
ISO/TS 16949
7. Our Security Culture
Make your security engineers part of
your product/service engineering teams
Make your compliance team part of your
engineering and security teams
9. Our Security Culture…
Proactive, predictive monitoring rules the day
• What’s “normal” in your environment?
• Depending on signatures == waiting to
find out WHEN you’ve been had
10. Our Security Culture…
Base decisions on facts, metrics, &
detailed understanding of your
environment and adversaries
12. AWS: Cloud Leader and Visionary
Gartner Magic Quadrant for Cloud Infrastructure as a Service, Worldwide
Source: Gartner (May 2015)
Gartner “Magic Quadrant for Cloud Infrastructure as a Service, Worldwide,” Lydia Leong, Douglas
Toombs, Bob Gill, May 18, 2015. This Magic Quadrant graphic was published by Gartner, Inc. as part of
a larger research note and should be evaluated in the context of the entire report. The Gartner report is
available at http://aws.amazon.com/resources/analyst-reports/. Gartner does not endorse any vendor,
product or service depicted in its research publications, and does not advise technology users to select
only those vendors with the highest ratings or other designation. Gartner research publications consist of
the opinions of Gartner's research organization and should not be construed as statements of fact.
Gartner disclaims all warranties, expressed or implied, with respect to this research, including any
warranties of merchantability or fitness for a particular purpose.
14. Cloud Security Alliance – AWS Keynote (Dec 2013)
“Seven Systemic Advantages of Cloud Security”
Seven reasons, plus one to grow on:
1. Security is the CSP’s highest priority; no compromises, ever
2. Integration of compliance and security
3. Economies of scale and separation of duties
4. Customers refocus on systems and applications
5. Visibility, homogeneity, and automation
6. Cloud platforms as “systems containers”
7. Cloud, big data, security: using the cloud to secure the cloud
8. With cloud speed of innovation and increasing scale, the story
will only get better – quickly!
15. USA CIO Tony Scott
“I see the big cloud providers in the same way I
see a bank,” he says. “They have the incentive,
they have skills and abilities, and they have the
motivation to do a much better job of security than
any one company or any one organization can
probably do. […] I think today the better bet is get
to the cloud as quick as you can because you're
guaranteed almost to have better security there
than you will in any private thing you can do.”
CIO Magazine: http://bit.ly/1LpX8Uy
16. Role of compliance
and 3rd party auditors
• Vendor claims alone are not
good enough!
• Testing, auditing and certification
by multiple teams of 3rd-party
pros provides needed proof
• Far more rigorous process than
any gov’t agency or corporation
could reasonably sustain
17. Five Security Myths About the AWS Cloud
1. Multi-tenancy is inherently risky
2. In the cloud, I lose visibility and control
3. Incident response is harder in the cloud
4. In the cloud I must choose between central governance
and control versus agility and mission ownership (aka
“shadow IT”)
5. Cloud is only appropriate for less sensitive data; more
sensitive data is safer on-premises
18. Multi-tenancy
• The AWS business fundamentally depends on complete
isolation of tenants
• Logical isolation, automation of controls, push-button
encryption of all data—these far outweigh value of
physical separation
• Separation of duties and data protection through
services like Key Management Service and CloudHSM
• Dedicated instances and dedicated hosts in EC2 for the
extra-cautious
19. Visibility and Control
• Easy/cheap to enable logging of APIs & data services
• CloudTrail, S3, ELB, CloudWatch/CloudWatch Logs, VPC Flow
Logs, CloudFront
• Rich 3rd party ecosystem
• AWS Config and Config Rules for configuration
management and state maintenance
• Powerful IAM system to enforce least privilege
• Limit even administrative access to core security data
with API-level MFA, Glacier policies, etc.
20.
21. Incident Response
• Prepare in advance!
• With preparation, IR is easier and richer in AWS that in
on-prem environments (ask NASA JPL IG)
• Three presentations with lots of details:
SEC308: Wrangling Security Events in The Cloud (ReInvent 2015):
https://www.youtube.com/watch?v=uc1Q0XCcCv4
SEC216: Harden Your Architecture with Security Incident Response Simulations (same):
https://www.youtube.com/watch?v=u-mRU44Q5u4
NIST Forensics in the Cloud Conference, Sept 2015:
http://www.nist.gov/itl/cloud/cloud_comp_webcast_viii.cfm, click on Day 3, Part 6
22. Central Control Versus Agility
• Reframing: GRC and the AWS cloud
• Governance means being able to answer key questions
• What do I have? How is performing? Who can control/is
controlling it? What is it costing me? Is it in compliance? Is it
secure?
• Achieve both goals with a centralized governance
organization and decentralized development teams
• https://www.youtube.com/watch?v=YYiV_z9D2CE
23. Cloud Only Appropriate for Less Sensitive Data
• Reasonable to start with less sensitive data /
workloads on your cloud journey
• There is a learning curve, so lower your risks while
learning
• However, that is not the end state!
24. “From a physical and logical security standpoint, I
believe that, if done right, public cloud computing is
as or more secure than self-hosting.”
– Steve Randich, EVP and CIO, Financial Industry Regulatory Authority, USA
FINRA now deploying multiple Hadoop-based and Redshift-based
analytics apps core to their regulatory mission
• Multi-petabyte clusters growing by terabytes per day
• Core apps in full production since January 2015
• Half way thru 2 year plan to go “all in” to the AWS cloud
Improving security with the cloud
25. Improving security with the cloud
For more details, see Re:Invent 2013 presentations by NASA JPL cyber
security engineer Matt Derenski (http://awsps.com/videos/SEC205E-640px.mp4)
“Based on our experience, I believe that we can be even
more secure in the AWS cloud than in our own
datacenters.”
-Tom Soderstrom, CTO, NASA JPL
26. Rob Alexander / CIO of Capital One Bank
“And of course, security is critical for us.
The financial services industry attracts
some of the worst cyber criminals. So
we worked closely with the AWS team
to develop a security model which, we
believe, allows us to operate more
securely in the public cloud than we can
even in our own datacenters.”
re:Invent Keynote 2015 https://youtu.be/0E90-ExySb8
27. UK MoJ CTO David Rogers
“You should probably start engaging with
the idea that the cloud can be
considerably more secure than the private
cloud or your own data centre, and start
engaging with the risks that are building in
the spaces where you haven't moved to
the cloud yet.”
The Guardian: http://bit.ly/1HXS321
(emphasis added)
28. Former CIO of US VA & DoC Roger Baker in NextGov.com (Jan 2015):
“Why Commercial Cloud Are More Secure Than Federal Data Centers”
Six reasons:
• New and sometimes purpose-built equipment and software,
constantly updated
• System configurations are standardized and automatically
created to eliminate variances, and for maximum efficiency
• Security patches are automatically applied to all systems on a
timely basis
• Cloud environments are certified to multiple different national
and international security standards
• The private sector can hire high-level system engineering and
security talent more readily; and
• The company’s brand is at risk should security be
compromised, ensuring full alignment and motivation.
http://bit.ly/1tMrUSp
29. Analyst’s Perspective
CIOs and CISOs need to stop obsessing over
unsubstantiated cloud security worries, and instead
apply their imagination and energy to developing new
approaches to cloud control, allowing them to securely,
compliantly and reliably leverage the benefits of this
increasingly ubiquitous computing model.
Clouds Are Secure: Are You Using Them Securely?
Published: 22 September 2015
-- Jay Heiser