Free Online DevOps Conference 2020
ІЛЛЯ ЛУБЕНЕЦЬ
«DevSecOps наступний етап розвитку DevOps»
Сайт: www.devopsconf.org
Ми в
www.facebook.com/godevopsevent
www.t.me/GoDevOpsEvent
www.linkedin.com/showcase/go-devops
NSS Labs’ 2016 Information Security PredictionsNSS Labs
NSS Labs’ Mike Spanbauer, Andrew Braunberg, and Jason Pappalexis review the need for independent testing, 2015 security year in review and a look ahead to 2016 security predictions.
Outpost24 webinar - A day in the life of an information security professional Outpost24
Get more information about security challenges and pitfalls you might face throughout the vulnerability management cycle, including internal obstacles thanks to these slides
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis
In the wake of the massive "WannaCry" ransomware attack that took the world by storm on Friday, May 12, businesses are scrambling to improve their IT security. Learn how Acronis Active Protection can help prevent another attack like this one from knocking your business offline.
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
Adam Maskatiya from Kaspersky Lab is delivering an insightful talk entitled "Redefining Security in an Era of Digital Transformation" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
Save Time and Act Faster with PlaybooksThreatConnect
Ingesting threat data, malware analysis, and data enrichment can all be time consuming tasks. ThreatConnect’s Playbooks feature can automate these things along with almost any cybersecurity task using an easy drag-and-drop interface - no coding needed.
You’ll learn how to:
- Build Playbooks that automatically run based on events in your network.
- Easily send indicators to any of ThreatConnect’s 100+ integration partners including firewalls and SIEMS.
- Ingest and send data from any tool (including tools not yet integrated with ThreatConnect).
- Use Playbooks to get disconnected tools to all talk to each other.
We build a Playbook live on the webinar and also show you where to find ThreatConnect-provided Playbook templates.
Outpost24 webinar - Implications when migrating to a Zero Trust modelOutpost24
As zero trust moves higher up on the CISOs security agenda we’re hosting a webinar to discuss the pros and cons of adopting this new approach and how it can impact your team’s ability to remain agile, whilst protecting your business.
As a recent study demonstrates, 34% of security breaches involved insiders in 2019 meaning CISOs are becoming more likely to consider zero trust and it should come as no surprise that many organizations are now eager to adopt a zero-trust security policy.
NSS Labs’ 2016 Information Security PredictionsNSS Labs
NSS Labs’ Mike Spanbauer, Andrew Braunberg, and Jason Pappalexis review the need for independent testing, 2015 security year in review and a look ahead to 2016 security predictions.
Outpost24 webinar - A day in the life of an information security professional Outpost24
Get more information about security challenges and pitfalls you might face throughout the vulnerability management cycle, including internal obstacles thanks to these slides
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis
In the wake of the massive "WannaCry" ransomware attack that took the world by storm on Friday, May 12, businesses are scrambling to improve their IT security. Learn how Acronis Active Protection can help prevent another attack like this one from knocking your business offline.
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
Adam Maskatiya from Kaspersky Lab is delivering an insightful talk entitled "Redefining Security in an Era of Digital Transformation" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
Save Time and Act Faster with PlaybooksThreatConnect
Ingesting threat data, malware analysis, and data enrichment can all be time consuming tasks. ThreatConnect’s Playbooks feature can automate these things along with almost any cybersecurity task using an easy drag-and-drop interface - no coding needed.
You’ll learn how to:
- Build Playbooks that automatically run based on events in your network.
- Easily send indicators to any of ThreatConnect’s 100+ integration partners including firewalls and SIEMS.
- Ingest and send data from any tool (including tools not yet integrated with ThreatConnect).
- Use Playbooks to get disconnected tools to all talk to each other.
We build a Playbook live on the webinar and also show you where to find ThreatConnect-provided Playbook templates.
Outpost24 webinar - Implications when migrating to a Zero Trust modelOutpost24
As zero trust moves higher up on the CISOs security agenda we’re hosting a webinar to discuss the pros and cons of adopting this new approach and how it can impact your team’s ability to remain agile, whilst protecting your business.
As a recent study demonstrates, 34% of security breaches involved insiders in 2019 meaning CISOs are becoming more likely to consider zero trust and it should come as no surprise that many organizations are now eager to adopt a zero-trust security policy.
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
Alex Michael from SonicWall present "2017/2018 Cyber Threat Report in an Enterprise Mobile World" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
Cloud Security Architecture - a different approachEC-Council
Whether people admit or not, everyone is moving to the cloud and all future business will run somewhere on the internet. Moving to the cloud requires different set of architecture and mindset. Data is stored, accessed and processed on different platforms and devices. Employees are working anywhere from the world, corporate data is no more under company IT custody. CISOs and CIOs need to think differently and set new Cloud Security Architecture. This session will try to draw the main areas of concern from Security perspective while moving to the cloud.
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24
Our security expert will provide an overview of the evolution of security analytics, explain what a risk score means and give you ideas on ways you can make sense of your security data to improve your security posture.
Cyberattacks are on the rise, and a breach causes significant damage to an enterprise. Active Directory is a prime target for hackers, so how can enterprises protect AD against a breach? Learn more at skyportsystems.net.
Top 5 Cloud Security Predictions for 2016 Alert Logic
Join Alert Logic Chief Strategy Officer and Co-Founder Misha Govshteyn as he presents his predictions for the state of cloud security in 2016, including:
-The rise of cloud adoption and how businesses will approach the cloud
-What the threat landscape for cloud environments will look like
-How data and analytics will evolve to meet cloud adoption
...and more.
You’ll get a clear view of what expert security researchers are expecting in the coming year for organizations like yours who are leveraging the power of cloud infrastructure.
See the accompanying webinar here: https://www.alertlogic.com/resources/webinars/top-5-cloud-security-predictions-for-2016/
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24
In our next webinar, Simon Roe Product Manager at Outpost24 will discuss how you can create greater and more robust visibility of security within the application development lifecycle.
Jon Murphy, National Practice Lead, AOS
Top 10 Trends for 2015 in Information Tech Risk Management
ITRM is more than merely security hardware and apps under the control of an overworked network admin. It is strategic and tactical process, technology, and people in various roles and levels working collaboratively to protect vital organizational assets like data, information, ability to delivery timely, and reputation. Organizations need continuous, current, Actionable InsightSM about probable sources of majorly impactful risks and threats. Then and only then are they adequately prepared to make the smartest investments in continuing education, process improvement, and procedures for the proper use of the right technology for their situation. This multi-media, interactive presentation will cover the current top trends for 2015 in ITRM and that Actionable InsightSM - what your organization can and should do about likely and impactful IT risks and vulnerabilities.
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
Ransomware. The very word strikes fear into the hearts of admins, backup specialists, and security pros. Backup software vendors know if all your data is not protected, there is a good chance that if (when?) ransomware hits, you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
Independent lab MRG-EFFITAS looked at a number of consumer backup software solutions and concluded that Acronis True Image 2017 New Generation was the best in terms of backup speed, protection from ransomware, ease of use, and features. This slideshare shows highlights from this independent report and provides a link to the full report.
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
Darren Rawlinson from Samsung presents "Dealing with Cyber Threats in an Enterprise Mobile World" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
This is the presentation from Null/OWASP/g4h November Bangalore MeetUp by Shivendra Saxena.
technology.inmobi.com/events/null-owasp-g4h-november-meetup
This topic would deal with the introduction to threat modeling. We'll discuss about the process of brainstorming about the issues which might appear when the product gets built. Will discuss about the STRIDE model and about the importance of the eraky detection of the security issues.
This presentation was given by Security Analyst Josh Chou from Cybereason on June 14, 2019 at the Technology Association of Louisville Kentucky's Cybersecurity Summit.
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24
There’s a gap between the hacker’s view and the defender’s view of an attack. The defender strives to break down the complex whole to simple components that can be assessed individually while the hacker thrives on complexity and sees opportunities in the white space between assessments.
Outpost24 webinar - Enhance user security to stop the cyber-attack cycleOutpost24
We discuss how securing Active Directory and helping employees recognize common attack methods are key to reducing cyber risk to your organization in and out of the office
In these times where North American companies are under constant cyber-attack, can you afford to underestimate the disaster that a security breach could cause on your organization?
Your organization's leadership has entrusted your team with the company's cyber security, and this includes ensuring that user data is safe and their productivity isn't compromised.
Join our panel of experts (Alex Brandt, who brings 19 years of hands-on expertise in the IT space, and Cynthia James, a security expert with over 25 years in the industry) as they discuss the 7 biggest reasons that business security gets compromised (and what you can do about it).
These include:
The threat of increased employee mobility
Managing BYOD
Perimeter-less networks
The best way to reduce human error
And MUCH more...
Stick around until the end and gain the visibility you need to uncover security holes before they become major disasters and put your organization and (even worse) your job at risk.
Presentation from Cyber Security for Critical Assets conference (CS4CA ) in Houston, March 26-28 2019 presented by Sergio Caltagirone, Vice President of Threat Intelligence.
Covers:
- overview of the OT threat landscape
- new OT threats Dragos has uncovered through its industrial cybersecurity technology platform, array of services, and industrial threat intelligence.
- details on major industrial threat activity groups and root causes of many recent OT compromises
Learn more here: https://dragos.com/year-in-review/
More info: www.dragos.com
Follow us on LinkedIn: https://www.linkedin.com/company/dragos-inc./
Follow us on Twitter: https://twitter.com/dragosinc
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24
In this webinar, our expert will discuss why CISOs must embrace unified cyber risk management for greater consolidation and simplification of business risk to build trust and maximize business resilience.
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
Alex Michael from SonicWall present "2017/2018 Cyber Threat Report in an Enterprise Mobile World" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
Cloud Security Architecture - a different approachEC-Council
Whether people admit or not, everyone is moving to the cloud and all future business will run somewhere on the internet. Moving to the cloud requires different set of architecture and mindset. Data is stored, accessed and processed on different platforms and devices. Employees are working anywhere from the world, corporate data is no more under company IT custody. CISOs and CIOs need to think differently and set new Cloud Security Architecture. This session will try to draw the main areas of concern from Security perspective while moving to the cloud.
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24
Our security expert will provide an overview of the evolution of security analytics, explain what a risk score means and give you ideas on ways you can make sense of your security data to improve your security posture.
Cyberattacks are on the rise, and a breach causes significant damage to an enterprise. Active Directory is a prime target for hackers, so how can enterprises protect AD against a breach? Learn more at skyportsystems.net.
Top 5 Cloud Security Predictions for 2016 Alert Logic
Join Alert Logic Chief Strategy Officer and Co-Founder Misha Govshteyn as he presents his predictions for the state of cloud security in 2016, including:
-The rise of cloud adoption and how businesses will approach the cloud
-What the threat landscape for cloud environments will look like
-How data and analytics will evolve to meet cloud adoption
...and more.
You’ll get a clear view of what expert security researchers are expecting in the coming year for organizations like yours who are leveraging the power of cloud infrastructure.
See the accompanying webinar here: https://www.alertlogic.com/resources/webinars/top-5-cloud-security-predictions-for-2016/
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24
In our next webinar, Simon Roe Product Manager at Outpost24 will discuss how you can create greater and more robust visibility of security within the application development lifecycle.
Jon Murphy, National Practice Lead, AOS
Top 10 Trends for 2015 in Information Tech Risk Management
ITRM is more than merely security hardware and apps under the control of an overworked network admin. It is strategic and tactical process, technology, and people in various roles and levels working collaboratively to protect vital organizational assets like data, information, ability to delivery timely, and reputation. Organizations need continuous, current, Actionable InsightSM about probable sources of majorly impactful risks and threats. Then and only then are they adequately prepared to make the smartest investments in continuing education, process improvement, and procedures for the proper use of the right technology for their situation. This multi-media, interactive presentation will cover the current top trends for 2015 in ITRM and that Actionable InsightSM - what your organization can and should do about likely and impactful IT risks and vulnerabilities.
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
Ransomware. The very word strikes fear into the hearts of admins, backup specialists, and security pros. Backup software vendors know if all your data is not protected, there is a good chance that if (when?) ransomware hits, you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
Independent lab MRG-EFFITAS looked at a number of consumer backup software solutions and concluded that Acronis True Image 2017 New Generation was the best in terms of backup speed, protection from ransomware, ease of use, and features. This slideshare shows highlights from this independent report and provides a link to the full report.
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
Darren Rawlinson from Samsung presents "Dealing with Cyber Threats in an Enterprise Mobile World" at the Midlands Cyber Security Expo 2018 #midscybersecurity18
This is the presentation from Null/OWASP/g4h November Bangalore MeetUp by Shivendra Saxena.
technology.inmobi.com/events/null-owasp-g4h-november-meetup
This topic would deal with the introduction to threat modeling. We'll discuss about the process of brainstorming about the issues which might appear when the product gets built. Will discuss about the STRIDE model and about the importance of the eraky detection of the security issues.
This presentation was given by Security Analyst Josh Chou from Cybereason on June 14, 2019 at the Technology Association of Louisville Kentucky's Cybersecurity Summit.
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24
There’s a gap between the hacker’s view and the defender’s view of an attack. The defender strives to break down the complex whole to simple components that can be assessed individually while the hacker thrives on complexity and sees opportunities in the white space between assessments.
Outpost24 webinar - Enhance user security to stop the cyber-attack cycleOutpost24
We discuss how securing Active Directory and helping employees recognize common attack methods are key to reducing cyber risk to your organization in and out of the office
In these times where North American companies are under constant cyber-attack, can you afford to underestimate the disaster that a security breach could cause on your organization?
Your organization's leadership has entrusted your team with the company's cyber security, and this includes ensuring that user data is safe and their productivity isn't compromised.
Join our panel of experts (Alex Brandt, who brings 19 years of hands-on expertise in the IT space, and Cynthia James, a security expert with over 25 years in the industry) as they discuss the 7 biggest reasons that business security gets compromised (and what you can do about it).
These include:
The threat of increased employee mobility
Managing BYOD
Perimeter-less networks
The best way to reduce human error
And MUCH more...
Stick around until the end and gain the visibility you need to uncover security holes before they become major disasters and put your organization and (even worse) your job at risk.
Presentation from Cyber Security for Critical Assets conference (CS4CA ) in Houston, March 26-28 2019 presented by Sergio Caltagirone, Vice President of Threat Intelligence.
Covers:
- overview of the OT threat landscape
- new OT threats Dragos has uncovered through its industrial cybersecurity technology platform, array of services, and industrial threat intelligence.
- details on major industrial threat activity groups and root causes of many recent OT compromises
Learn more here: https://dragos.com/year-in-review/
More info: www.dragos.com
Follow us on LinkedIn: https://www.linkedin.com/company/dragos-inc./
Follow us on Twitter: https://twitter.com/dragosinc
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24
In this webinar, our expert will discuss why CISOs must embrace unified cyber risk management for greater consolidation and simplification of business risk to build trust and maximize business resilience.
The state of web applications (in)security @ ITDays 2016Tudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.
Top Application Security Trends of 2012DaveEdwards12
Learn about the major risks to Cloud and Web-based Applications. What are their weaknesses? How can you deploy them in a more confident fashion and avoid the risks? What can you do to protect these applications without creating a major burden on your end-users and customers. Application Security has become one of the top most priorities of CIOs, CSOs and IT Staff in 2012. Cloud has created a paradigm shift in how we leverage technology. Learn about the power of the Cloud to Secure your applications.
This is the latest version of the State of the DevSecOps presentation, which was given by Stefan Streichsbier, founder of guardrails.io, as the keynote for the Singapore Computer Society - DevSecOps Seminar in Singapore on the 13th January 2020.
As presented by Tim Mackey, Senior Technical Evangelist at Black Duck Software, at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious.
Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily.
In this session we’ll present:
- How known vulnerabilities can make their way into production deployments
- How vulnerability impact is maximized
- A methodology for ensuring deployment of vulnerable code can be minimized
- A methodology to minimize the potential for vulnerable code to be redistributed
Secure application deployment in the age of continuous deliveryTim Mackey
As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious.
Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily.
In this session we’ll present:
- How known vulnerabilities can make their way into production deployments
- How vulnerability impact is maximized
- A methodology for ensuring deployment of vulnerable code can be minimized
- A methodology to minimize the potential for vulnerable code to be redistributed
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
James Brown, Director of Cloud Computing & Security Architecture, Alert Logic covers:
• The shared security model: what security you are responsible for to protect your content, applications, systems and networks vs AWS.
• Overview of the OWASP Top 10 most critical web application security risks (such as SQL injections)
• Best practices for how to protect your environment from the latest threats
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
Have you ever wondered why our web apps, and mobile web apps in particular, are hard to secure?
Be sure to read the speakers notes in this presentation
In this lengthy presentation, you will observe where researchers and hackers corrupt the developer's intentions...then, you will look at the Good, the Bad and the Ugly of Secure Software Development, WAF considerations, and Mobile Device Management...
Security in the age of open source - Myths and misperceptionsTim Mackey
As delivered at Interop ITX 2017.
The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware.
This presentation by Christopher Grayson covers some lessons learned as a security professional that has made his way into software engineering full time.
Learn all about the Latest CompTIA Security+ SYO-701 Exam in 2 minutes! Swipe through the slides to discover the new updates in this latest version, its course content, target audience, exam details, career scope, and more.
𝐒𝐭𝐚𝐫𝐭 𝐲𝐨𝐮𝐫 𝐥𝐞𝐚𝐫𝐧𝐢𝐧𝐠 𝐣𝐨𝐮𝐫𝐧𝐞𝐲 𝐧𝐨𝐰! 👉 https://www.infosectrain.com/courses/comptia-security/
Similar to ІЛЛЯ ЛУБЕНЕЦЬ «DevSecOps наступний етап розвитку DevOps» GO DevOps (20)
АРТЕМ КОБРІН «Achieve Networking at Scale with a Self-Service Network Solutio...UA DevOps Conference
Free Online DevOps Conference 2020
АРТЕМ КОБРІН
«Achieve Networking at Scale with a Self-Service Network Solution for AWS»
Сайт: www.devopsconf.org
Ми в
www.facebook.com/godevopsevent
www.t.me/GoDevOpsEvent
www.linkedin.com/showcase/go-devops
СТАНІСЛАВ КОЛЕНКІН «Cilium – Network security for microservices. Let’s see ho...UA DevOps Conference
Lviv DevOps Conference 2019
СТАНІСЛАВ КОЛЕНКІН
«Cilium – Network security for microservices. Let’s see how it works with Istio»
Телеграм канал: https://t.me/GoDevOpsEvent
Фейсбук сторінці: https://www.facebook.com/godevopsevent/
Сайт: https://devopsconf.org/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
4. Security is important
• Average data breach cost – 4$ millions
• Attacks rose in 2020 – 600%
• Ukraine government is on 5th place of target attacks
• 70% of small business can’t deal with cyber attack
• 16% of healthcare providers are ready to prevent attack