This document provides information on various topics related to Office 365 and Azure, including:
- Office 365 service plans that group capabilities into packages for different customer needs.
- The Office 365 platform architecture, which uses loose coupling and isolation to improve reliability of services.
- Azure virtual machines, cloud services, and other products and their usage numbers.
- Security and privacy features of Office 365 such as data ownership, encryption, monitoring and more.
- Options for using Azure with SharePoint such as hosting SharePoint in VMs or using Azure services.
- Final thoughts on the roles of cloud and on-premises solutions and how hybrid approaches can reduce risks.
Health Decisions Webinar: January 2013 data warehousesSi Nahra
Claims and enrollment data are a self-funded plan’s most important (and often most overlooked) asset. Do you know where your plan’s 2012 data are? They are warehoused somewhere. Whoever controls that warehouse controls your plan.
In this free webinar we will highlight the key features of data warehousing that assure you control your data and your plan. Ten criteria are presented that you should use to assess your current data warehouse arrangements and determine who really controls your plan.
For more information, please visit: http://www.healthdecisions.com
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
Properly Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)"
I have noticed that there is a growing wave of discontent and disenchantment from information security and compliance practitioners around the PCI DSS. Josh Corman has been an effective voice for these concerns, providing an intellectually honest and earnest analysis in his talk “Is PCI The No Child Left Behind Act For Infosec?”
The problem are well-known and significant: too much ambiguity in the PCI DSS, Qualified Security Assessors (QSAs) and consultant using subjective interpretations, existing guidance either too prescriptive or too vague, scope missing critical systems that could risk cardholder data, overly broad scope and excessive testing costs, excessive subjectivity and inconsistency, poor use of scarce resources, no meaningful reduction in risk of data breaches, and so forth.
For years, I have been studying the PCI DSS compliance problem, as well. I have noticed many similarities to the PCI compliance challenges and the “SOX-404 Is The Biggest IT Time Waster” wars in 2005. I was part of the leadership team at the Institute of Internal Auditors (IIA) where we did something about the it. We identified inability to accurately scope the IT portions of SOX-404 as the root cause of the billions of dollars of wasted time and effort, while not reducing the risk of financial misstatements.
I propose to present the two-year success story of the IIA GAIT project and how we changed the state of the IT audit practice in support of SOX-404 financial reporting audits. We defined the four GAIT Principles, which could be used to correctly scope the IT portions of SOX-404. We mobilized over 100K internal auditors, the SEC and PCAOB regulatory and enforcement bodies, as well as the external auditors from the 8 big CPA firms (e.g, Big Four and other firms doing SOX advisory work). In short, we made a difference, in a highly political process that involved many constituencies.
I am attempting to do something similar with the PCI Security Standards Council, through my work as part one of the leaders of the PCI Scoping SIG (Special Interest Group). My personal goal is to find a “third way” to better enable correct scoping of the PCI Cardholder Data Environment, and create a risk-based approach of substantiating the effective controls to ensure that cardholder data breaches can be prevented, and quickly detected and corrected when they do occur.
My desired outcome is to find fellow travelers who also see the pile of dead bodies in PCI compliance efforts, and work with those practitioners to catalyze a similar movement to achieve the spirit and intent of PCI DSS.
Kaasaegsed ettevõtted muutuvad üha mobiilsemaks, kuna töötajad suudavad üha enam tööd teha kontorisse tulemata. Kuidas sellises uues situatsioonis säilitada kontroll organisatsiooni andmete üle ning tagada kasutajate ja seadmete turvalisus.
Esineja: Tõnis Tikerpäe
Happiest Minds Technologies is a digital transformation, infrastructure, security, and product engineering services company. The company was founded by Ashok Soota In 2011. It is headquartered In Bangalore, India and has its operations in the United States, United Kingdom, Canada, Singapore, and Australia.
Melbourne Office 365 User Group - February 2015Michael Frank
Melbourne Office 365 User Group - February 2015
What's New?
Much has changed since our November meeting. We will give you an update about the recent Office 365 news and features.
Office 365 Australia
Late in 2014 Microsoft announced the arrival of Office 365 to Australian Data Centres. This will affect both new and existing customers in Australia, so we will explore what this means for both groups and take a look at when you can start using the local service.
http://www.meetup.com/Melbourne-Office-365-Meetup
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?
The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.
How would you like to minimize or even eliminate these business interruptions, and more?
Join us to discover:
• Useful and simple measures to use that can help you keep the lights on
• How to quickly recover when the worst-case scenario occurs
• How to achieve zero downtime and high availability
A number of studies suggest the number of enterprises switching to Managed Services to focus extensively on their core business processes and operations. The enterprises even have the option to outsource specific aspects of their day-to-day IT operations by choosing from a variety of managed services. For instance, a business can avail specific managed services to run its software applications, manage database operations, monitor system security, manage cloud infrastructure, or protect corporate and user data.
Health Decisions Webinar: January 2013 data warehousesSi Nahra
Claims and enrollment data are a self-funded plan’s most important (and often most overlooked) asset. Do you know where your plan’s 2012 data are? They are warehoused somewhere. Whoever controls that warehouse controls your plan.
In this free webinar we will highlight the key features of data warehousing that assure you control your data and your plan. Ten criteria are presented that you should use to assess your current data warehouse arrangements and determine who really controls your plan.
For more information, please visit: http://www.healthdecisions.com
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
Properly Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)"
I have noticed that there is a growing wave of discontent and disenchantment from information security and compliance practitioners around the PCI DSS. Josh Corman has been an effective voice for these concerns, providing an intellectually honest and earnest analysis in his talk “Is PCI The No Child Left Behind Act For Infosec?”
The problem are well-known and significant: too much ambiguity in the PCI DSS, Qualified Security Assessors (QSAs) and consultant using subjective interpretations, existing guidance either too prescriptive or too vague, scope missing critical systems that could risk cardholder data, overly broad scope and excessive testing costs, excessive subjectivity and inconsistency, poor use of scarce resources, no meaningful reduction in risk of data breaches, and so forth.
For years, I have been studying the PCI DSS compliance problem, as well. I have noticed many similarities to the PCI compliance challenges and the “SOX-404 Is The Biggest IT Time Waster” wars in 2005. I was part of the leadership team at the Institute of Internal Auditors (IIA) where we did something about the it. We identified inability to accurately scope the IT portions of SOX-404 as the root cause of the billions of dollars of wasted time and effort, while not reducing the risk of financial misstatements.
I propose to present the two-year success story of the IIA GAIT project and how we changed the state of the IT audit practice in support of SOX-404 financial reporting audits. We defined the four GAIT Principles, which could be used to correctly scope the IT portions of SOX-404. We mobilized over 100K internal auditors, the SEC and PCAOB regulatory and enforcement bodies, as well as the external auditors from the 8 big CPA firms (e.g, Big Four and other firms doing SOX advisory work). In short, we made a difference, in a highly political process that involved many constituencies.
I am attempting to do something similar with the PCI Security Standards Council, through my work as part one of the leaders of the PCI Scoping SIG (Special Interest Group). My personal goal is to find a “third way” to better enable correct scoping of the PCI Cardholder Data Environment, and create a risk-based approach of substantiating the effective controls to ensure that cardholder data breaches can be prevented, and quickly detected and corrected when they do occur.
My desired outcome is to find fellow travelers who also see the pile of dead bodies in PCI compliance efforts, and work with those practitioners to catalyze a similar movement to achieve the spirit and intent of PCI DSS.
Kaasaegsed ettevõtted muutuvad üha mobiilsemaks, kuna töötajad suudavad üha enam tööd teha kontorisse tulemata. Kuidas sellises uues situatsioonis säilitada kontroll organisatsiooni andmete üle ning tagada kasutajate ja seadmete turvalisus.
Esineja: Tõnis Tikerpäe
Happiest Minds Technologies is a digital transformation, infrastructure, security, and product engineering services company. The company was founded by Ashok Soota In 2011. It is headquartered In Bangalore, India and has its operations in the United States, United Kingdom, Canada, Singapore, and Australia.
Melbourne Office 365 User Group - February 2015Michael Frank
Melbourne Office 365 User Group - February 2015
What's New?
Much has changed since our November meeting. We will give you an update about the recent Office 365 news and features.
Office 365 Australia
Late in 2014 Microsoft announced the arrival of Office 365 to Australian Data Centres. This will affect both new and existing customers in Australia, so we will explore what this means for both groups and take a look at when you can start using the local service.
http://www.meetup.com/Melbourne-Office-365-Meetup
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?
The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.
How would you like to minimize or even eliminate these business interruptions, and more?
Join us to discover:
• Useful and simple measures to use that can help you keep the lights on
• How to quickly recover when the worst-case scenario occurs
• How to achieve zero downtime and high availability
A number of studies suggest the number of enterprises switching to Managed Services to focus extensively on their core business processes and operations. The enterprises even have the option to outsource specific aspects of their day-to-day IT operations by choosing from a variety of managed services. For instance, a business can avail specific managed services to run its software applications, manage database operations, monitor system security, manage cloud infrastructure, or protect corporate and user data.
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Differences between Enterprise contract levels. Articulation of benefits for moving to an E5.
(Note: This document is visible only for those with the link.)
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
Document management compliance responsibilities have become easier to cope with through the advent of more flexible technology. In fact, an effective document management system is capable of increasing business value, streamlining workflow and simplifying regulatory compliance. While a digital document management system cannot by itself make a business compliant, it can significantly assist in fulfilling stringent multi-regulatory rules and retention requirements. And, with the right technology, organizations can gain efficiency, improve profitability and increase productivity, all while reducing the cost of compliance.
In our presentation, we will discuss the main challenges regarding Document Management in the Maritime Industry, and we will show an Enterprise Content Management solution that sufficiently addresses these challenges via a combination of state-of-the-art technology and a document repository that supports a broad range of compliance-related regulations and standards.
GDPR and technology - details matter, Kalle Varisvirta, Exove
Exove and Bird & Bird seminar on Nov 23rd 2016: "GDPR - Practical Effects on Digital Business - juridical, technical, and customer point of view"
Tool Integration is an effective technique of integrating tools of the same or different classes to build a robust tool framework to support various business operations.
Core Archive for SAP Solutions is a fully-featured archiving and document viewing solution that allows customers to archive content from the main SAP database yet still view and interact with the content directly from the Archive. Core Archive supports the archiving of all content and data from SAP and can leverage SAP ILM disciplines. Content is stored in a compliant manner ensuring that GDPR, CCPA and other standards can be met. Core Archive is entirely cloud-based, reducing the IT footprint and offering rapid time to value.
Redefining Business Mobility and Customer ExperienceCitrix
The financial services industry faces unprecedented pressure from customer demands, regulatory mandates, emerging technologies and highly-competitive markets. Citrix powers
financial services mobility to help companies deliver consistent customer service across traditional and digital channels, improve employee productivity and retention, and increase
IT efficiency, while at the same time ensuring security across their evolving infrastructures.
Rethink business with OpenText Core applications and servicesOpenText
OpenText Core cloud based SaaS applications for business and IT are purpose-built to simplify complex content challenges and transform digital business processes.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
As your IT services provider, we monitor & manage your servers, workstation, data, install patches, software updates, upgrades, and equipment, as well as provide technical support on all hardware, software and user related issues. Our solutions provide scalability, flexibility, and simplicity allowing our customers to leverage our IT expertise.
Cloud Enabled Disaster Recovery for SharePoint On-PremSeb Matthews
Slide deck for SPSNYC 2015 session "Cloud Enabled Disaster Recovery for SharePoint On-Prem" delivered on July 25th 2015 in NYC.
Questions? Comments? Shoot them to @sebmatthews
Thanks
SM August 2015
Identity + Mobile Management + Security
Keep your employees productive on their favorite apps and devices—and your company data protected with enterprise mobility solutions from Microsoft.
Differences between Enterprise contract levels. Articulation of benefits for moving to an E5.
(Note: This document is visible only for those with the link.)
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Uni Systems S.M.S.A.
Document management compliance responsibilities have become easier to cope with through the advent of more flexible technology. In fact, an effective document management system is capable of increasing business value, streamlining workflow and simplifying regulatory compliance. While a digital document management system cannot by itself make a business compliant, it can significantly assist in fulfilling stringent multi-regulatory rules and retention requirements. And, with the right technology, organizations can gain efficiency, improve profitability and increase productivity, all while reducing the cost of compliance.
In our presentation, we will discuss the main challenges regarding Document Management in the Maritime Industry, and we will show an Enterprise Content Management solution that sufficiently addresses these challenges via a combination of state-of-the-art technology and a document repository that supports a broad range of compliance-related regulations and standards.
GDPR and technology - details matter, Kalle Varisvirta, Exove
Exove and Bird & Bird seminar on Nov 23rd 2016: "GDPR - Practical Effects on Digital Business - juridical, technical, and customer point of view"
Tool Integration is an effective technique of integrating tools of the same or different classes to build a robust tool framework to support various business operations.
Core Archive for SAP Solutions is a fully-featured archiving and document viewing solution that allows customers to archive content from the main SAP database yet still view and interact with the content directly from the Archive. Core Archive supports the archiving of all content and data from SAP and can leverage SAP ILM disciplines. Content is stored in a compliant manner ensuring that GDPR, CCPA and other standards can be met. Core Archive is entirely cloud-based, reducing the IT footprint and offering rapid time to value.
Redefining Business Mobility and Customer ExperienceCitrix
The financial services industry faces unprecedented pressure from customer demands, regulatory mandates, emerging technologies and highly-competitive markets. Citrix powers
financial services mobility to help companies deliver consistent customer service across traditional and digital channels, improve employee productivity and retention, and increase
IT efficiency, while at the same time ensuring security across their evolving infrastructures.
Rethink business with OpenText Core applications and servicesOpenText
OpenText Core cloud based SaaS applications for business and IT are purpose-built to simplify complex content challenges and transform digital business processes.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
As your IT services provider, we monitor & manage your servers, workstation, data, install patches, software updates, upgrades, and equipment, as well as provide technical support on all hardware, software and user related issues. Our solutions provide scalability, flexibility, and simplicity allowing our customers to leverage our IT expertise.
Cloud Enabled Disaster Recovery for SharePoint On-PremSeb Matthews
Slide deck for SPSNYC 2015 session "Cloud Enabled Disaster Recovery for SharePoint On-Prem" delivered on July 25th 2015 in NYC.
Questions? Comments? Shoot them to @sebmatthews
Thanks
SM August 2015
Taking your business to the cloud spscbus variant updateSeb Matthews
Slide deck for SPSCBUS 2015 session "Taking Your Business to the Cloud" delivered on August 8th 2015 in NYC.
Questions? Comments? Shoot them to @sebmatthews
Thanks
SM August 2015
The deck for my 2014 DevIntersection Las Vegas session on how the multitude of Microsoft lego bricks come together to form cohesive solutions centered around SharePoint
The Tao of SharePoint KEYNOTE VARIOUS VERSIONSeb Matthews
Here's the deck for my session that runs through the key success factors that make SharePoint work for organisations. A keynote session, its punchy and soundbite heavy!
What is it that the social networking websites of today lack? Is it a host of snazzy features that are never of any use? Or is it the super-striking appearance that always does more harm than good. Take a sneak peak to know what is actually required.
Speedy App: Frontend Performance ConsiderationsPierre Spring
Execution time in the backend is not all there is to the speed of a web application. In this talk, we'll look at the basic enhancements we can make to get an applications that truly feels snappy!
Presented at the New Zealand Computer Society 50th Anniversary Conference. The conference theme was about ICT Innovation.
This presentation was delivered during the conference by Phil Patton, IBM NZ will focus on answering in simple terms the key questions many are asking in their quest to understand why there is so much hype around Cloud – what are the key ingredients of Cloud Computing? And what’s different about it, what are the deployment types, and what workloads are suitable for Cloud deployment?
Phil will also cover the Enterprise Roadmap for Cloud adoption, the integration and connectivity between Cloud and legacy applications and address the significant security concerns related to the uptake of Cloud.
Microsoft Azure Rights Management provides a comprehensive policy-based enterprise solution to help protect your valuable information, no matter whom you share it with. For $2.00 per user per month, you get Information Rights Management capabilities such as Do Not Forward and Company Confidential, as well as Office 365 Message Encryption, which allows you send encrypted emails to anyone!
Easily enforce policies to improve data security
Both Information Rights Management and Office 365 Message Encryption are policy based and designed to work with the Exchange transport rule engine. That means Microsoft Azure Rights Management allows you to set up complex policy restrictions easily, with just a single action.
Simple and convenient communication management
Information Rights Management is built to work across multiple workloads such as Exchange, SharePoint, and Office documents, and it makes it easier to set restrictions and provide permissions. Office 365 Message Encryption comes with a modern user interface that makes it easy to use.
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance.
The Okta service provides directory services, single sign-on, strong authentication, provisioning, workflow, and built in reporting. It runs in the cloud on a secure, reliable, extensively audited platform and integrates deeply with on premises applications, directories, and identity management systems.
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
Intel sponsor workshop: Disrupting the data center
#gigaomlive
More at http://events.gigaom.com/structure-2014/
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
Watch full webinar here: https://bit.ly/3joZa0a
The current data landscape is fragmented, not just in location but also in terms of processing paradigms: data lakes, IoT architectures, NoSQL, and graph data stores, SaaS applications, etc. are found coexisting with relational databases to fuel the needs of modern analytics, ML, and AI. The physical consolidation of enterprise data into a central repository, although possible, is both expensive and time-consuming. A logical data warehouse is a modern data architecture that allows organizations to leverage all of their data irrespective of where the data is stored, what format it is stored in, and what technologies or protocols are used to store and access the data.
Watch this session to understand:
- What is a logical data warehouse and how to architect one
- The benefits of logical data warehouse – speed with agility
- Customer use case depicting logical architecture implementation
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
Does moving core business applications to AWS make sense for your organization? This session covers key business and IT considerations gathered from industry experts and real-world enterprise customers who have chosen to move their mission critical ERP applications to the AWS cloud, resulting in lower costs and better service.
This session covers the following:
- Insights from industry experts and analysts, who explain how the cloud affects costs from three angles: launch, operations, and long-term infrastructure expense
- Review of how time-to-value and cloud launch processes differ from on-premises infrastructure
- How AWS offers increased security and reliability over what some enterprises can afford on their own
Sponsored by Infor
Similar to Journey to the Cloud with Dora The Explorer (Spookinnati Version) (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
11. Enterprise-grade cloud
services & servers
Proven productivity solutions that are easy to use and manage
Flexible tools to do your best
work, across devices
12.
13.
14.
15.
16.
17.
18.
19. Last mile and P2P
Last mile providers deliver
to consumers
P2P technology improves
last mile delivery
Core: Data centers
Global Fiber backbone that
connects Data Centers
Edge Nodes
Connect Data Centers to
Internet Exchange Points
Metro solutions
Connecting business customers
to last mile providers
20. IT Load
CRAC Chiller Condenser Cooling towers Water supply
UPS
Generators
Transformer Generators
Power supply
22. Office 365 services are loosely coupled
Separation of function with distributed
functional components
Loose coupling further limits the scope
and impact of most failures
Service component isolation to avoid
failure cascades
Replication of directory data ensures a
seamless experience.
SPO
EXO
Microsoft Online ID
Office 365 Portal
Office 365 Provisioning
Lync
Example: Reliability
23. • Group service plans into packages
• Offered on specific terms: trial, paid, volume
• Examples: Office 365 Small Biz (P1), Office
365 Enterprise (E3)
SKUs
• Define capabilities that a tenant or
user is entitled to
• Examples: SPO for Enterprise
Service Plans
• SharePoint, Exchange,
Skype 4B & others
• Translate Plans into
experiences & features
Services
27. Customers know where
their data is stored
Customers know who can
access their data and why
Customers can stay in the
know by choosing to
receive updates regarding
changes to security,
privacy and audit
information
No advertising:
We don’t build advertising
products out of customer
data
No data mining:
We don’t scan the contents
of customer email or
documents for analytics
or data mining
No co-mingling:
Business data and
consumer data are stored
separately
Data is portable:
Customer owns the data
and can remove their data
whenever they choose
ISO 27001
EU Model Clauses
HIPAA-HITECH
FERPA
FISMA
U.K. G-Cloud IL2
CJIS
24 hour monitored
physical datacenters
Logical isolation of data
between tenants
Segregation of internal
datacenter network from
the external networks.
Encryption at rest and
in transit (AD-RMS)
Securing access to
services via identity
Data loss prevention
Anti-virus/anti spam
99.9% uptime
Financial guarantees
on uptime
Redundancy in both
functionality as well data
Automated monitoring
and recovery systems
24x7 on-call engineering
team available to handle
issues
28. Cloud Identity
Single identity in the cloud
Suitable for small organizations
with no integration to on-
premises directories
Directory & Password
Synchronization
Single identity
suitable for medium
and large organizations
without federation
Federated Identity
Single federated identity
and credentials suitable
for medium and large
organizations
48. And finally…
• Cloud computing changes the role of IT, but does
not supersede it
• Don’t think about “why should I..?” focus on “why
shouldn’t I..?”
• On-premises is still an option
• Hybrid makes entry and migration less complex
and risk reduced
51. Thanks for being here…
http://bigseb.me/sebdecks
http://sebmatthews.net
@sebmatthews
http://linkedin.com/in/sebmatthews
seb@sebmatthews.net
don’t forget to check
out…