When operating within an outsourced multi-vendor / Service Integration & Management (SIAM) operating model it is important to have an effective IT tooling strategy.
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
In our webinar following the publication of the AXELOS white paper "An example ITIL-based model for effective Service Integration and Management (SIAM)", the author, SIAM consultant Kevin Holland, described examples of proven concepts and techniques to effectively manage a complex multi-supplier environment.
Kevin also discussed what SIAM is in detail, and how it could be applied in your own organization, as well as providing advice on what works and the pitfalls to avoid.
You can watch the full webinar recording at: www.axelos.com/events-calendar/itil-and-siam-an-example-itil-based-model
11 Actions that will make your SIAM Programme successfulSteve Morgan
Service Integration & Management (SIAM) is a term given to IT Operating Models which cater for multi-vendor strategies. This presentation describes the 11 Actions that you must adopt to make your SIAM programme a success
HD version: http://1drv.ms/1eR5OQf
This is my publication on how the integration of the TOGAF Enterprise Architecture framework, the SABSA Enterprise Security Architecture framework, and Information Governance discipline add up to a robust and successful Information Security Management Program.
Use a Service Taxonomy to Organize and Manage Your IT Services ! What services do we offer? How do we organize them? How can we make them "customer centric?” What is a good starting point?
Successful IT Service Catalogs have well organized services. The Services Taxonomy, or framework is the key to organizing and understanding your services well.
Please join us to learn how to build a good service taxonomy in 4 logical steps, as well as 3 key mistakes to avoid.
In addition to a demo of our prebuilt service taxonomy, we will demonstrate these concepts in our constantly evolving view of a very advanced Employee Self-Service Catalog & Portal, built on ServiceNow technologies.
Recording with demo available at http://content.evergreensys.com/service-taxonomy-webinar-slides-manage-it-services
Enterprise Architecture
Enterprise Architectural Methodologies
A Brief History of Enterprise Architecture
Zachman Framework
Business Attributes
Features & Advantages
SABSA Lifecycle
SABSA Development Process
SMP Maturity Levels
In our webinar following the publication of the AXELOS white paper "An example ITIL-based model for effective Service Integration and Management (SIAM)", the author, SIAM consultant Kevin Holland, described examples of proven concepts and techniques to effectively manage a complex multi-supplier environment.
Kevin also discussed what SIAM is in detail, and how it could be applied in your own organization, as well as providing advice on what works and the pitfalls to avoid.
You can watch the full webinar recording at: www.axelos.com/events-calendar/itil-and-siam-an-example-itil-based-model
11 Actions that will make your SIAM Programme successfulSteve Morgan
Service Integration & Management (SIAM) is a term given to IT Operating Models which cater for multi-vendor strategies. This presentation describes the 11 Actions that you must adopt to make your SIAM programme a success
HD version: http://1drv.ms/1eR5OQf
This is my publication on how the integration of the TOGAF Enterprise Architecture framework, the SABSA Enterprise Security Architecture framework, and Information Governance discipline add up to a robust and successful Information Security Management Program.
Use a Service Taxonomy to Organize and Manage Your IT Services ! What services do we offer? How do we organize them? How can we make them "customer centric?” What is a good starting point?
Successful IT Service Catalogs have well organized services. The Services Taxonomy, or framework is the key to organizing and understanding your services well.
Please join us to learn how to build a good service taxonomy in 4 logical steps, as well as 3 key mistakes to avoid.
In addition to a demo of our prebuilt service taxonomy, we will demonstrate these concepts in our constantly evolving view of a very advanced Employee Self-Service Catalog & Portal, built on ServiceNow technologies.
Recording with demo available at http://content.evergreensys.com/service-taxonomy-webinar-slides-manage-it-services
Service integration and management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers.
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM) to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
The session theme is "Threat Management, Next Generation Security Operations Center".
The session focuses how security information and event management can help enterprises to collects data from the heterogeneous landscape to have incident response plans and have automation in the entire security operations framework.
The session is handled by The session will be handled by Mr.Ravi Shankar Mallah, Architect / IBM security Specialist – Resilient & i2.
Ravi has over 13+ years of experience in the field of Cyber security. Over the course of his career he has been involved in building & running multiple enterprise level SOC while taking care of both perimeter and internal security of these setup. He also enjoys real life experience of various Security related technologies such as SIEM, SOAR, IPS, firewalls, Vulnerability management, Anti-APT solutions etc.
In his current role at IBM he is working as an Architect and enjoys the role of specialist for Incident Response Platform (IRP) and Threat Hunting
Enterprise Content Management (ECM) solutions provide robust functionality to control and analyze information. ECM solutions help reduce search times, manage data, and enable institutions with regulatory compliance. The correlation between impact on a business process through ECM implementation stage is demonstrated and been shown to follow reported hypothesis by Reimer (2002). The objective of this article is to provide (1) a typical architecture of an ECM, (2) identify key challenges in implementation and (3) implementation road map strategy
How To Drive A Successful ServiceNow ImplementationAspire Systems
In this webcast we discussed on ServiceNow Implementation , it's key success factors and the pitfalls.
• ITSM – The enablers and constraints
• ServiceNow – Introduction and key benefits
• How to ensure an effective ServiceNow Implementation?
->The Prerequisites
->A realistic, yet effective Roadmap
->Avoid the Pitfalls
• Case study: ServiceNow implementation for a Fortune100 firm
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsEvergreen Systems
IT Service Catalog - Service Taxonomy
What services do we offer? How do we organize them? How can we make them "customer-centric?" What is a good starting point?
Successful IT Service Catalogs have well-organized services. The services taxonomy, or framework is the key to organizing and managing your services effectively.
Please join us to learn how to build a good service taxonomy in 4 logical steps, as well as 3 key mistakes to avoid.
We will also briefly demonstrate our beautiful and innovative customer-centric IT Service Catalog (built on ServiceNow).
The strategic importance of Information Security for organisations is gaining momentum. The current surge in cyber threats is compelling organisations to invest in information security to protect their assets. Rushing to protect assets often comes with the expense of excessive technology adoption without a valid strategic foundation. Enterprise Security Architecture is geared to address these issues, but is frequently misaligned with Enterprise Architecture. In this presentation we explore avenues for the adoption and enforcement of Security-By-Design in the Enterprise Architecture value-chain so as position Risk, Security and IT as true business enablers.
IT Governance Powerpoint Presentation SlidesSlideTeam
“You can download this product from SlideTeam.net”
Enable efficient use of information technology using these content ready IT Governance PowerPoint Presentation Slides. Take advantage of these corporate governance PPT templates to showcase the components of IT alignment like business strategy, IT strategy, business infrastructure, and IT infrastructure. Take the assistance of these data governance PPT visuals to show the steps of business alignment such as identification of key drivers, cost schedule, etc. Portray the managerial processes including direction setting processes, negotiation processes, monitoring and control processes using these IT performance PPT layouts. Demonstrate the organizational processes like work, behavioral, and change processes with this IT alignment PowerPoint deck. Reveal the gap between the current state and the future state along with the strategy to bridge that gap using these information technology governance PPT slideshow. Download these amazing data governance PPT layout and ensure the integrity and security of your organizational information. https://bit.ly/3EZfMDi
Mario Vivas, CEO, River Horse
ITIL4 is out and everyone is eager to learn about the updates this release introduces. This session will summarize the key changes that ITIL4 presents with a focus on the more operational processes that organizations deliver on a day to day basis (Incident, Problem, Change and so on). The ServiceNow platform has a powerful set of baseline features and optional plugin functions that can help an organization align with the recommendations of ITIL4.
Please join us and Mario to learn about how you can start applying ITIL4 concepts in your ServiceNow implementations!
See how to Assess Your Application: https://www.castsoftware.com/use-cases/application-assessment
Assessing application development like the rest of the business
Well overdue, it is time to measure application development and
maintenance the same way as the rest of the business, based on not just how much work someone does, but how well they do the work. As we know, looking to see if the code works as expected is only a single measurement. Knowing how easy it will be to maintain over time, how flexible it is to change as required by business changes, how quickly new team members can understand the code and get working on it and how easily the application can be tested are just some of the things that we need to look at in order to understand the real quality of the work being done by application development teams. When these measurements are combined with ways of counting the productivity (quantity) of development teams, we can get a real understanding of how well the teams are performing and what return is being realized from the investment. These measurements can be assessed both for in-house development organizations as well as the work being done by outsourcers.
The applications delivered by IT are a significant differentiator between competitors and therefore it needs to be managed as a core business process. Held up against corporate standards and no matter how or where the development work is done, it must be done well and the resulting applications need to be able to withstand time.
See how to Assess Your Application: https://www.castsoftware.com/use-cases/application-assessment
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.
(Source : RSA Conference USA 2017)
Strategic Operating Model Defines How a Company Looks and Works. This document gives a good overview of the the various aspects of the concept including:
1. Understand the Linkage Between Strategy and an Operating Model.
2. Recognize the Key Components of a Company’s Operating Model.
3. Familiarize Use of Operating Models to Make Comparisons Across Companies.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
Why you really need a SIAM tooling strategy Steve Morgan
Service Integration & Management (SIAM) is the term applied to IT Operating Models which cater for a multi-vendor strategy. If you are adopting a SIAM approach, this presentation will help you develop your underpinning tooling strategy
Service integration and management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers.
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM) to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
Architecting Next Generatio IT Operating Models Using IT4IT and SFIASukumar Daniel
A case study of a Transformation Initiative to move a Third Party from Traditional Mechanic Shop Mentality to a Customisation Studio Mentality by causing a paradigm Shift in Ways of Working
The session theme is "Threat Management, Next Generation Security Operations Center".
The session focuses how security information and event management can help enterprises to collects data from the heterogeneous landscape to have incident response plans and have automation in the entire security operations framework.
The session is handled by The session will be handled by Mr.Ravi Shankar Mallah, Architect / IBM security Specialist – Resilient & i2.
Ravi has over 13+ years of experience in the field of Cyber security. Over the course of his career he has been involved in building & running multiple enterprise level SOC while taking care of both perimeter and internal security of these setup. He also enjoys real life experience of various Security related technologies such as SIEM, SOAR, IPS, firewalls, Vulnerability management, Anti-APT solutions etc.
In his current role at IBM he is working as an Architect and enjoys the role of specialist for Incident Response Platform (IRP) and Threat Hunting
Enterprise Content Management (ECM) solutions provide robust functionality to control and analyze information. ECM solutions help reduce search times, manage data, and enable institutions with regulatory compliance. The correlation between impact on a business process through ECM implementation stage is demonstrated and been shown to follow reported hypothesis by Reimer (2002). The objective of this article is to provide (1) a typical architecture of an ECM, (2) identify key challenges in implementation and (3) implementation road map strategy
How To Drive A Successful ServiceNow ImplementationAspire Systems
In this webcast we discussed on ServiceNow Implementation , it's key success factors and the pitfalls.
• ITSM – The enablers and constraints
• ServiceNow – Introduction and key benefits
• How to ensure an effective ServiceNow Implementation?
->The Prerequisites
->A realistic, yet effective Roadmap
->Avoid the Pitfalls
• Case study: ServiceNow implementation for a Fortune100 firm
IT Service Catalog: Build a Service Taxonomy in 4 Easy StepsEvergreen Systems
IT Service Catalog - Service Taxonomy
What services do we offer? How do we organize them? How can we make them "customer-centric?" What is a good starting point?
Successful IT Service Catalogs have well-organized services. The services taxonomy, or framework is the key to organizing and managing your services effectively.
Please join us to learn how to build a good service taxonomy in 4 logical steps, as well as 3 key mistakes to avoid.
We will also briefly demonstrate our beautiful and innovative customer-centric IT Service Catalog (built on ServiceNow).
The strategic importance of Information Security for organisations is gaining momentum. The current surge in cyber threats is compelling organisations to invest in information security to protect their assets. Rushing to protect assets often comes with the expense of excessive technology adoption without a valid strategic foundation. Enterprise Security Architecture is geared to address these issues, but is frequently misaligned with Enterprise Architecture. In this presentation we explore avenues for the adoption and enforcement of Security-By-Design in the Enterprise Architecture value-chain so as position Risk, Security and IT as true business enablers.
IT Governance Powerpoint Presentation SlidesSlideTeam
“You can download this product from SlideTeam.net”
Enable efficient use of information technology using these content ready IT Governance PowerPoint Presentation Slides. Take advantage of these corporate governance PPT templates to showcase the components of IT alignment like business strategy, IT strategy, business infrastructure, and IT infrastructure. Take the assistance of these data governance PPT visuals to show the steps of business alignment such as identification of key drivers, cost schedule, etc. Portray the managerial processes including direction setting processes, negotiation processes, monitoring and control processes using these IT performance PPT layouts. Demonstrate the organizational processes like work, behavioral, and change processes with this IT alignment PowerPoint deck. Reveal the gap between the current state and the future state along with the strategy to bridge that gap using these information technology governance PPT slideshow. Download these amazing data governance PPT layout and ensure the integrity and security of your organizational information. https://bit.ly/3EZfMDi
Mario Vivas, CEO, River Horse
ITIL4 is out and everyone is eager to learn about the updates this release introduces. This session will summarize the key changes that ITIL4 presents with a focus on the more operational processes that organizations deliver on a day to day basis (Incident, Problem, Change and so on). The ServiceNow platform has a powerful set of baseline features and optional plugin functions that can help an organization align with the recommendations of ITIL4.
Please join us and Mario to learn about how you can start applying ITIL4 concepts in your ServiceNow implementations!
See how to Assess Your Application: https://www.castsoftware.com/use-cases/application-assessment
Assessing application development like the rest of the business
Well overdue, it is time to measure application development and
maintenance the same way as the rest of the business, based on not just how much work someone does, but how well they do the work. As we know, looking to see if the code works as expected is only a single measurement. Knowing how easy it will be to maintain over time, how flexible it is to change as required by business changes, how quickly new team members can understand the code and get working on it and how easily the application can be tested are just some of the things that we need to look at in order to understand the real quality of the work being done by application development teams. When these measurements are combined with ways of counting the productivity (quantity) of development teams, we can get a real understanding of how well the teams are performing and what return is being realized from the investment. These measurements can be assessed both for in-house development organizations as well as the work being done by outsourcers.
The applications delivered by IT are a significant differentiator between competitors and therefore it needs to be managed as a core business process. Held up against corporate standards and no matter how or where the development work is done, it must be done well and the resulting applications need to be able to withstand time.
See how to Assess Your Application: https://www.castsoftware.com/use-cases/application-assessment
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed the global security architecture and roadmap addressing security gaps by architecture domain and common security capability. This session will discuss the architecture framework, capability matrix, the architecture development methodology and key deliverables.
(Source : RSA Conference USA 2017)
Strategic Operating Model Defines How a Company Looks and Works. This document gives a good overview of the the various aspects of the concept including:
1. Understand the Linkage Between Strategy and an Operating Model.
2. Recognize the Key Components of a Company’s Operating Model.
3. Familiarize Use of Operating Models to Make Comparisons Across Companies.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
Why you really need a SIAM tooling strategy Steve Morgan
Service Integration & Management (SIAM) is the term applied to IT Operating Models which cater for a multi-vendor strategy. If you are adopting a SIAM approach, this presentation will help you develop your underpinning tooling strategy
This presentation provides you with an overview of Business Process Management (BPM). The slides are from AIIM's BPM Certificate Program, which is a training program designed from global best practices among AIIM's 65,000 Associate and Professional members. The BPM program covers concepts and technologies for process streamlining and re-engineering; requirements gathering and analysis; application integration; process design and modelling; monitoring and process analysis; and managing change. For more information visit www.aiim.org/training
Implementing SIAM framework or providing it? Want to manage ITIL processes in multi-customer/vendor environments? Want to easily connect your ITSM tool and processes? Learn more about the World's First SaaS Solution for Service Integration.
P.S. we can set-up end-to-end ITSM tool integration in one day. And vendor-to-vendor integrations are build-in as well...
Reliability programs should support strategic corporate objectives
Relevant Key Performance Indicators
Measure program effectiveness
Provide believable data
KPI management and other Reporting options in Maximo
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
The proper integration of your Remote Monitoring & Management (RMM) solution with your Professional Services Automation (PSA) tool yields service delivery efficiencies greater than the sum of their parts. But no vendor offers a true, tight integration of both technologies, so how do you accomplish this?
You Have To Follow A Best Practice
In this 60 minute webinar, former MSP owner and renowned MSP expert Erick Simpson of SPC International will teach you the importance of process integration and optimization, so you can get the most out of Kaseya and your PSA tool using effective service delivery management best practices.
In This Webinar You'll Learn:
Key industry best practices for PSA process design and implementation using several proprietary techniques – based on years of practical experience with all the common PSA tools)
How to integrate and configure best practice processes, procedures, workflows, forms, agreements, and templates for maximum effectiveness
What to expect during your integration journey, with examples of client onboarding, project initiation, change management, billing/accounting management, SLA management, marketing/sales process, and more
How other MSPs have used these techniques and increased profitability by 20% - or MORE
And much more
Awesome CMS! Implementing Configuration Management to Maximise Value #LEADitAwesome CMS
This presentation supports the objectives of the itSMF LEADit 2012 ITSM Alchemy stream, positioned in the Service Asset and Configuration Management topic. Our new book, Awesome CMS! Implementing Configuration Management to Maximise Value, and this aligned presentation, will deliver to the audience practical advice and a roadmap to assist with current and future configuration management deployments, covering people, process and tool elements.
We have defined an approach that encompasses small, incremental, achievable steps. A characteristic of any ITSM deployment is expectations management, and as each step is completed it is important to engage with sponsors and stakeholders to ensure expectations are being met. We encourage practitioners to start small – a fully defined, functional and integrated CMS evolves over time, and should be tackled one service at a time. Start with one critical business service, define its components, map the relationships and start measuring, and always go back to ensure the business is happy with your progress.
MSP Best Practice | Optimizing RMM Solutions and Increasing MSP ProfitsDavid Castro
MSP best practice. Content includes the following: Why it’s important to analyze the configuration of your RMM solution against industry best practices (and
where to get those practices and how do to the analysis); How to check thresholds and alerts against user roles and policy settings for maximum effectiveness; How to audit the integration of your RMM solution with your PSA tool, including a review of dashboards and reports – and learn why this is often overlooked; How to implement these changes to increase your profitability by 10% to 20%. Presented by Kaseya with SPC International (fka MSP University). October 2013
5 Keys to Improved IT Operation ManagementPrecisely
IT Operations Management (ITOM) is more important than ever in today’s fast-changing world. It helps IT to ensure availability, maintenance, and deployment of hardware, software, services, and processes. Companies who rely on ServiceNow have invested in solving this challenge and trying to get a comprehensive view of their entire infrastructure.
However, for many of them, there is one crucial area of missing data. ServiceNow does not natively discover critical infrastructure resources from IBM Power Systems and IBM Z mainframes. This can leave them vulnerable to blind spots, their ITOM initiatives can go awry, and periods of downtime can be extended.
Join us for this webinar we will cover:
· The five key ITOM enablers to gain complete visibility into all areas of the infrastructure.
· How Ironstream for ServiceNow can fill the gaps in ITOM coverage
· How Discovery, Service Mapping, and Event Management work together to deliver ITOM success
Battelle Memorial Institute uses Maximo 7.5 with TRM RulesManager in a Software as a Service (SaaS) environment to facilitate the Contract Logistical Support (CLS) contract burden for maintaining Chemical, Biological, Radiological and Nuclear detection systems, vehicles, and personal protection/mitigation equipment; and reporting on their performance as a contractor to the U.S. Army. Battelle leverages Maximo to track equipment readiness and report on maintenance actions. We track supply processes and maintain the smallest supply footprint possible while still maintaining an increased state of military readiness. This presentation will discuss how Maximo SaaS keeps operating costs low, with minimal personnel and hardware expenses to maintain it. The discussion will also include an explanation of how RulesManager has allowed Battelle to implement its customers unique business processes while ensuring data integrity and lowering the amount of time spent in the system for field workers.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. 2
How to build and operate an
effective SIAM tooling solution
Steve Morgan
Service North 2018
November
2018
3. 3
The Challenge
In moving to a SIAM operating model:
• How do you ensure continual and efficient transmission of transactions between you and your SIAM eco-
system?
• How do have a “single source of the truth” upon which to base business decisions?
• How do ensure that the quality and availability of data isn’t any worse under a SIAM model?
• How do you build accurate reporting without a large reporting team?
4. 4
The Scenarios you’ll find yourself in
Scenario Benefits Watch out for….
You have an established toolset which
includes the main functionality. You’d like
all your vendors to use this
• You own the workflows, data
structures, etc.
• No dependency on service providers,
enables flexibility in future
• “Behind the curtain” integrations
• In-house or third party skills to
maintain the tool
• You’re on the hook for keeping data up
to date
You’re looking to establish a new toolset,
provided by one or more of your SIAM eco-
system providers
• They’ll bring established workflows
and processes
• They’ll maintain the tool and the data
• Other service providers may be
reluctant to use it, due to visibility of
performance and loss of IP and control
• “Behind the curtain” integrations
You’re looking to introduce a new toolset at
the same time as your new SIAM operating
model
• All stakeholders have the opportunity
to contribute to it
• Decision making may take time
• Suppliers may still be unwilling to use
it
5. 5
What are the potential pain-points?
There’s more than we think….!
Incident / Request /
Problem / Change
workflow
Master data availability
and update
Transient data availability
and update
System health /
performance data and
dashboard
Service Performance / SLA
data collation Project / Programme
demand and delivery data
6. 6
Your ITSM SIAM tooling scope
But don’t forget…..
• Finance
• Supplier / Contract Management
• Project and Portfolio Management
7. 7
Four Key Elements of a good ITSM Tool
Integration CMDB
Workflow Common Data Dictionary
8. 8
Discovery
• Discovery capability must be able to integrate with ITSM tool
and CMDB
• SIAM retains accountability for CMDB/Asset Mgt across the
SIAM eco-system, with service providers providing content
• Discovery is hard! – Don’t de-prioritise your Discovery
workstream
• Discovery of hardware assets is typically easiest
• Software discovery is easier for COTS software, but some
home-grown apps can be problematic
9. 9
• Biggest issues in a SIAM environment are:
– Getting acceptance in the SIAM eco-system to use a single tool
– Service Provider’s existing tools and processes are often optimised for their organisations and therefore difficult
to integrate with or replace
– Keeping an accurate picture in a single reference tool
– Discovery of the relationships between assets
– Making the connection between discovered assets and non-discoverable CIs like Services, Business Processes,
etc
– Mapping what’s discovered back to the CMDB
– Unpredictability of Pricing
Issues with Discovery in a SIAM environment
10. 10
Software Asset Management (SAM)
• Discovery software will identify software assets
• Level of license / software use data can be difficult to
manage
• In a SIAM model your Service Providers will each
manage and provide information on software
licensing in their tower
• The SIAM organisation will normally be responsible
for pulling this together in a single picture
• Who is accountable for compliance?
• Beware ITSM tools claiming SAM capability, this tends
to be fairly basic, and won’t cover all software types,
nor support sophisticated requirements like metering
11. 11
Event correlation & Dashboarding
• This area is often overlooked but is critical
• Tower providers will each have their own systems
management tools and will monitor alerts for the
systems in their scope
• Integrating all of these alerts into Business Service
dashboards is the responsibility of an event correlation
tool
• Ideally, this is integrated into the CMDB to allow the
Service “overlay” to system events
• It is monitored by the SIAM layer
– to ensure issues are being addressed in a timely
manner
– to correlate alerts generated from different towers
to identify potential service impacting issues
12. 12
Reporting
• Beware of creating a cottage-industry for reporting in
each service provider
• Categorise reports by type
– Commercial
– Service
– Service Provider
• Maintain under change control to prevent report
proliferation
• Attempt to standardise reports to avoid variations by
customer and catalogue reports by type
• Avoid reports which are purely volumetric
– Trends are interesting, but this is just data
– Turn it into information by measuring against
targets / KPIs
13. 13
Capacity Management
Business
Capacity
Service
Capacity
Resource
Capacity
SIAM Towers provide capacity
data for their services
SIAM correlates into Service Views
using Service Catalogue / CMDB
integration
The business provides strategic
intent for translation into service and
technical impacts
Tower specific tools
Data analysis, trending,
forecasting tool
Integration with Service
Catalogue & CMDB
The same principle applies for Availability and Service Continuity
14. 14
Key Takeaways
• Define a Tooling Strategy at the outset
• Baseline existing tooling
• Think Beyond the ITSM tool
• Interoperability is vital
• Involve the SIAM eco-system service providers to ensure
that their tools complement the SIAM toolset
• Assign ownership
• Seek to reduce duplication between tools
• Don’t be afraid to adapt as you progress
• Ensure alignment with processes
• Ensure commitment through ongoing involvement of
those who will use the tool
15. 15
Thank You!
Steve Morgan, Syniad IT
www.SyniadITSolutions.co.uk
• All of our SIAM content, can be found for FREE, here http://bit.ly/ServiceNorth
• You can sign up for our newsletter on the website
• Follow us on Twitter:
- @SteveBMorgan
- @SyniadIT