Talk by Michele Santuari:
This slot will give insights in the new architecture of the actual NetEye 4 version based on Icinga 2, allowing further scalability to perform also complex event processing (CEP) over a large number of event streams. CEP scenarios will process the events based on the resource consumption limits. The ability to do fast in-memory processing of events such as filtering, grouping and aggregating this way enables to do real time analysis.
Ransomware Attack: Best Practices to proactively prevent contain and respondAlgoSec
One of the biggest concerns for info security professionals and business executives right now is ransomware attacks. It has prompted many organizations urgently assess what they need to do to contain and limit their exposure to this threat.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will provide some best practices and tips to help organizations prevent, contain and respond to a ransomware attack.
In this webinar Professor Wool will discuss:
• The different methods used by cyber criminals to penetrate the network security perimeter
• Best practices for reducing cyber criminals’ lateral movements across the network
• How to augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
• Prioritizing incident remediation efforts based on business risk, and neutralizing impacted systems through zero-touch automation
• The impact of a ransomware on regulatory compliance
5 things you didn't know you could do with security policy managementAlgoSec
Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.
Many professionals believe that they need the latest and greatest new tools to address these challenges. But what if you already have what you need up and running in your organization; your security policy management solution?
Today’s security policy management solutions do far more than automate traditional change management tasks.
In this technical webinar, Edy Almer, AlgoSec VP of Products and Jeffrey Starr AlgoSec CMO, will discuss 5 key security management challenges facing enterprise organizations today and explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.
This technical webinar will focus on how to:
- Manage security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services (AWS), Cisco ACI and VMware NSX
- Map security vulnerabilities to their applications to assess and prioritize risk
- Enable SOC engineers to tie cyber-attacks to business processes
- Migrate firewall policies between firewall brands
- Perform a fully automated, zero-touch security policy change
Migrating and Managing Security Policies in a Segmented Data CenterAlgoSec
Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX and Cisco ACI now a reality it's far simpler to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
In this webinar, Prof. Wool will discuss how to:
•Identify and securely migrate legacy applications to a micro-segmented data center
•Effectively define and enforce security policies for East-West traffic
•Manage the micro-segmented data center alongside traditional on-premise security devices
•Identify risk and manage compliance in a micro-segmented data center
•Use network segmentation to reduce the scope of regulatory audits
•Identify and avoid common network segmentation mistakes
Adaptive Security and Incident Response - A Business-Driven ApproachAlgoSec
As organizations strive to maximize the opportunities and competitive advantages from their digital transformation initiatives, they are hindered by cyber and ransomware attacks, as well as increasing regulatory requirements. Both Information security professionals and business executives are now urgently assessing their organization’s strategies to contain and limit their exposure to these threats without impeding business operations.
Both infosecurity professionals and business executives are now urgently assessing their organization’s strategies to contain and limit their exposure to these threats without impeding business operations.
Tony Sequino, Sales Director, Financial Services, at AlgoSec will present a four-step approach to adapting and aligning security with business processes, to reduce risk and mitigate cyber-attacks, while ensuring your organization remains agile, secure and compliant.
In this webinar, Tony will discuss best practices for:
• Creating a plan that aligns your security strategy with the company’s business strategy and operations
• Developing a collaborative communication environment for all stakeholders
• Automating security policy change processes across the network estate
• Responding rapidly to detect and contain cyber and ransomware attacks
Webinar: How automation can transform the way you manage your network securit...AlgoSec
Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.
Join the webinar to learn how you can use automation to:
• Discover and map application connectivity to centralize and optimize security policy management
• Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
• Ensure your disaster recovery processes for firewalls are secure and up-to-date
• Take an application-centric approach to simplifying firewall rule recertification processes
Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain English queries, with a Google-like experience, right in your web browser.
Security Change Management: Agility vs. ControlAlgoSec
Today's fast paced business application deployments and changes require IT, networking and security to be more agile than ever before. Yet this agility often comes at the expense of security, control and accuracy. When facing a barrage of cyber-attacks this is not an option.
In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address these contradicting requirements, and eliminate the tension between the two, through a unique zero-touch approach to security policy management.
In this webinar Anner will present:
• The challenges and requirements for zero-touch security policy automation
• How automation can support business agility while maintaining checks and balances
• Defining a policy for pre-approved "more of the same" low risk changes
• Handling exceptions, risks and escalation
• Maintaining a full audit trail for compliance audits
• Tracking SLAs and further fine-tuning business agility
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
Managing application connectivity securely through a merger or acquisition – best practices
When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.
In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.
Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.
Key topics include how to:
• Automatically discover and map existing application connectivity flows prior to making any changes
• Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
• Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
• Deliver unified security policy management across the new enterprise environment
Ransomware Attack: Best Practices to proactively prevent contain and respondAlgoSec
One of the biggest concerns for info security professionals and business executives right now is ransomware attacks. It has prompted many organizations urgently assess what they need to do to contain and limit their exposure to this threat.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will provide some best practices and tips to help organizations prevent, contain and respond to a ransomware attack.
In this webinar Professor Wool will discuss:
• The different methods used by cyber criminals to penetrate the network security perimeter
• Best practices for reducing cyber criminals’ lateral movements across the network
• How to augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
• Prioritizing incident remediation efforts based on business risk, and neutralizing impacted systems through zero-touch automation
• The impact of a ransomware on regulatory compliance
5 things you didn't know you could do with security policy managementAlgoSec
Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.
Many professionals believe that they need the latest and greatest new tools to address these challenges. But what if you already have what you need up and running in your organization; your security policy management solution?
Today’s security policy management solutions do far more than automate traditional change management tasks.
In this technical webinar, Edy Almer, AlgoSec VP of Products and Jeffrey Starr AlgoSec CMO, will discuss 5 key security management challenges facing enterprise organizations today and explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.
This technical webinar will focus on how to:
- Manage security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services (AWS), Cisco ACI and VMware NSX
- Map security vulnerabilities to their applications to assess and prioritize risk
- Enable SOC engineers to tie cyber-attacks to business processes
- Migrate firewall policies between firewall brands
- Perform a fully automated, zero-touch security policy change
Migrating and Managing Security Policies in a Segmented Data CenterAlgoSec
Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX and Cisco ACI now a reality it's far simpler to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
In this webinar, Prof. Wool will discuss how to:
•Identify and securely migrate legacy applications to a micro-segmented data center
•Effectively define and enforce security policies for East-West traffic
•Manage the micro-segmented data center alongside traditional on-premise security devices
•Identify risk and manage compliance in a micro-segmented data center
•Use network segmentation to reduce the scope of regulatory audits
•Identify and avoid common network segmentation mistakes
Adaptive Security and Incident Response - A Business-Driven ApproachAlgoSec
As organizations strive to maximize the opportunities and competitive advantages from their digital transformation initiatives, they are hindered by cyber and ransomware attacks, as well as increasing regulatory requirements. Both Information security professionals and business executives are now urgently assessing their organization’s strategies to contain and limit their exposure to these threats without impeding business operations.
Both infosecurity professionals and business executives are now urgently assessing their organization’s strategies to contain and limit their exposure to these threats without impeding business operations.
Tony Sequino, Sales Director, Financial Services, at AlgoSec will present a four-step approach to adapting and aligning security with business processes, to reduce risk and mitigate cyber-attacks, while ensuring your organization remains agile, secure and compliant.
In this webinar, Tony will discuss best practices for:
• Creating a plan that aligns your security strategy with the company’s business strategy and operations
• Developing a collaborative communication environment for all stakeholders
• Automating security policy change processes across the network estate
• Responding rapidly to detect and contain cyber and ransomware attacks
Webinar: How automation can transform the way you manage your network securit...AlgoSec
Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.
Join the webinar to learn how you can use automation to:
• Discover and map application connectivity to centralize and optimize security policy management
• Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
• Ensure your disaster recovery processes for firewalls are secure and up-to-date
• Take an application-centric approach to simplifying firewall rule recertification processes
Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network using plain English queries, with a Google-like experience, right in your web browser.
Security Change Management: Agility vs. ControlAlgoSec
Today's fast paced business application deployments and changes require IT, networking and security to be more agile than ever before. Yet this agility often comes at the expense of security, control and accuracy. When facing a barrage of cyber-attacks this is not an option.
In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address these contradicting requirements, and eliminate the tension between the two, through a unique zero-touch approach to security policy management.
In this webinar Anner will present:
• The challenges and requirements for zero-touch security policy automation
• How automation can support business agility while maintaining checks and balances
• Defining a policy for pre-approved "more of the same" low risk changes
• Handling exceptions, risks and escalation
• Maintaining a full audit trail for compliance audits
• Tracking SLAs and further fine-tuning business agility
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
Managing application connectivity securely through a merger or acquisition – best practices
When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.
In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.
Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.
Key topics include how to:
• Automatically discover and map existing application connectivity flows prior to making any changes
• Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
• Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
• Deliver unified security policy management across the new enterprise environment
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
What links the Antwerp Diamond Heist, one of the world’s largest jewelry thefts and data center security? The famous heist was possible because there was no security within the safe deposit vault, enabling the criminals to stay inside undetected for days and steal items worth $100M.
Similarly, to help prevent serious breaches, data center networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to create and manage a micro-segmented data center environment that truly protects your organization’s valuables.
In this webinar, Avivi-Siman-Tov, Product Manager at AlgoSec will cover:
• How to securely migrate applications to a micro-segmented data center
• Identifying and avoiding common network segmentation pitfalls
• Defining and enforcing effective security policies for the micro-segmented data center
• Managing micro-segmented data centers alongside traditional networks and devices
• Identifying and managing security risk and compliance in a micro-segmented data center
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
Yonatan Klein, Director of Product Management (AlgoSec)
While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.
Each part of your network estate is managed in its own independent silo instead of being holistically managed.
Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.
He covers how to:
- Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
- Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices
- Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud
Presentation on current security trends, prevention and detection. This presentation was initially given at a WatchGuard partner event for Equinox IT. http://www.equinoxits.com/
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
The growing body of regulations and standards forces enterprises to put considerable emphasis on compliance verified by ad hoc and regular auditing of security policies and controls. While regulatory and internal audits entail a wide range of security checks, network firewalls are featured prominently as they are the first line of defense of the enterprise network.
Typical networks might include tens or hundreds of firewalls from multiple vendors running thousands of rules. Auditing firewalls for compliance is becoming more complex and demanding all the time.
• Documentation of current rules and their evolution of changes is lacking
• Time and resources required to find, organize and inspect all the firewall rules to determine the level of compliance is exorbitant and growing
It’s time to adopt auditing’s best practices to maintain continuous compliance. Join us in this webinar to discover the Firewall Audit Checklist, the 6 best practices that will ensure successful audits and full compliance. By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.
The recent WannaCry outbreak clearly demonstrates just how damaging ransomware can be, and how quickly such attacks can disrupt vital services. View the slides from our webinar to learn about WannaCry’s inner-workings, understand how to effectively protect from this threat and what you should do to be prepared for future attacks.
For more information: http://pages.checkpoint.com/anti-ransomware.html
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
“The only thing constant is change” dates back to 500 BC, but it has never rung more true when it comes to managing your network security policy. Bombarded by an onslaught of changes resulting from new applications, emerging threats and network re-architectures, security professionals struggle with manual processes as they sift through hundreds and often thousands of firewall rules and access lists. The result: slow response to business requests, and costly mistakes that cause outages and introduce risk.
This presentation covers:
· Common risks to avoid when making changes to your network security devices
· How to better understand business requirements from the network security perspective
· How to accelerate change requests and ensure security and compliance using automation
Putting the Sec into DevOps
DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.
In this webinar Professor Wool will cover how to:
• Identify and map existing applications and their connectivity flows to establish a baseline
• Adjust application connectivity for each stage of the DevOps lifecycle – without coding
• Automatically deploy connectivity throughout the development lifecycle using templates
• Proactively assess risk and compliance throughout the DevOps process
• Manage and maintain security in the production environment
Learn best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.
DevSecOps: Putting the Sec into the DevOpsshira koper
DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.
In this webinar Professor Wool will cover how to:
•Identify and map existing applications and their connectivity flows to establish a baseline
•Adjust application connectivity for each stage of the DevOps lifecycle – without coding
•Automatically deploy connectivity throughout the development lifecycle using templates
•Proactively assess risk and compliance throughout the DevOps process
•Manage and maintain security in the production environment
Talk by: Stefano Bruno
Tornado is a high performance and scalable application written in Rust. It is able to handle millions of events each second on standard server hardware. The main objective of this talk is to show how you can extend an Icinga2 with Tornado through the three main modules: Tornado data collector, Tornado rule engine, Tornado executor. With Tornado we will able to receive events from different channels like SNMP Trap, Syslog, Email, SMS, Telegram and match them against a rule engine and decide which action to associate.
By developing Alyvix, which is a visual monitoring system, we are finding opportunities for digital innovation. The latter results from filling functional gaps, shortening operational distances, saving user time and increasing the experience pleasure. In his talk Francesco focuses on two cases.
First, engineering a more effective data design and its process, through a modern UI and an efficient data protocol, directly leads to easier, quicker and more pleasant operations.
Second, a smart feature as an automatic image contouring, and its fine tuning with a particle swarm optimizer, elegantly automates boring and dispersive middle tasks with a magical feeling.
We think that owning the knowledge of your product, getting in touch with its stakeholders and sharpening its vision drives you to innovation, which increases the value of our digital tribe.
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
What links the Antwerp Diamond Heist, one of the world’s largest jewelry thefts and data center security? The famous heist was possible because there was no security within the safe deposit vault, enabling the criminals to stay inside undetected for days and steal items worth $100M.
Similarly, to help prevent serious breaches, data center networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to create and manage a micro-segmented data center environment that truly protects your organization’s valuables.
In this webinar, Avivi-Siman-Tov, Product Manager at AlgoSec will cover:
• How to securely migrate applications to a micro-segmented data center
• Identifying and avoiding common network segmentation pitfalls
• Defining and enforcing effective security policies for the micro-segmented data center
• Managing micro-segmented data centers alongside traditional networks and devices
• Identifying and managing security risk and compliance in a micro-segmented data center
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
Yonatan Klein, Director of Product Management (AlgoSec)
While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.
Each part of your network estate is managed in its own independent silo instead of being holistically managed.
Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.
In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.
He covers how to:
- Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
- Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices
- Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud
Presentation on current security trends, prevention and detection. This presentation was initially given at a WatchGuard partner event for Equinox IT. http://www.equinoxits.com/
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
The growing body of regulations and standards forces enterprises to put considerable emphasis on compliance verified by ad hoc and regular auditing of security policies and controls. While regulatory and internal audits entail a wide range of security checks, network firewalls are featured prominently as they are the first line of defense of the enterprise network.
Typical networks might include tens or hundreds of firewalls from multiple vendors running thousands of rules. Auditing firewalls for compliance is becoming more complex and demanding all the time.
• Documentation of current rules and their evolution of changes is lacking
• Time and resources required to find, organize and inspect all the firewall rules to determine the level of compliance is exorbitant and growing
It’s time to adopt auditing’s best practices to maintain continuous compliance. Join us in this webinar to discover the Firewall Audit Checklist, the 6 best practices that will ensure successful audits and full compliance. By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.
The recent WannaCry outbreak clearly demonstrates just how damaging ransomware can be, and how quickly such attacks can disrupt vital services. View the slides from our webinar to learn about WannaCry’s inner-workings, understand how to effectively protect from this threat and what you should do to be prepared for future attacks.
For more information: http://pages.checkpoint.com/anti-ransomware.html
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
“The only thing constant is change” dates back to 500 BC, but it has never rung more true when it comes to managing your network security policy. Bombarded by an onslaught of changes resulting from new applications, emerging threats and network re-architectures, security professionals struggle with manual processes as they sift through hundreds and often thousands of firewall rules and access lists. The result: slow response to business requests, and costly mistakes that cause outages and introduce risk.
This presentation covers:
· Common risks to avoid when making changes to your network security devices
· How to better understand business requirements from the network security perspective
· How to accelerate change requests and ensure security and compliance using automation
Putting the Sec into DevOps
DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.
In this webinar Professor Wool will cover how to:
• Identify and map existing applications and their connectivity flows to establish a baseline
• Adjust application connectivity for each stage of the DevOps lifecycle – without coding
• Automatically deploy connectivity throughout the development lifecycle using templates
• Proactively assess risk and compliance throughout the DevOps process
• Manage and maintain security in the production environment
Learn best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.
DevSecOps: Putting the Sec into the DevOpsshira koper
DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.
Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.
In this webinar Professor Wool will cover how to:
•Identify and map existing applications and their connectivity flows to establish a baseline
•Adjust application connectivity for each stage of the DevOps lifecycle – without coding
•Automatically deploy connectivity throughout the development lifecycle using templates
•Proactively assess risk and compliance throughout the DevOps process
•Manage and maintain security in the production environment
Talk by: Stefano Bruno
Tornado is a high performance and scalable application written in Rust. It is able to handle millions of events each second on standard server hardware. The main objective of this talk is to show how you can extend an Icinga2 with Tornado through the three main modules: Tornado data collector, Tornado rule engine, Tornado executor. With Tornado we will able to receive events from different channels like SNMP Trap, Syslog, Email, SMS, Telegram and match them against a rule engine and decide which action to associate.
By developing Alyvix, which is a visual monitoring system, we are finding opportunities for digital innovation. The latter results from filling functional gaps, shortening operational distances, saving user time and increasing the experience pleasure. In his talk Francesco focuses on two cases.
First, engineering a more effective data design and its process, through a modern UI and an efficient data protocol, directly leads to easier, quicker and more pleasant operations.
Second, a smart feature as an automatic image contouring, and its fine tuning with a particle swarm optimizer, elegantly automates boring and dispersive middle tasks with a magical feeling.
We think that owning the knowledge of your product, getting in touch with its stakeholders and sharpening its vision drives you to innovation, which increases the value of our digital tribe.
OSMC 2019 | Tornado – Extend Icinga2 for Active and passive Monitoring of com...NETWAYS
The main objective of this talk is to show how you can extend an Icinga2 active monitoring with a passive monitoring engine.
With Icinga2 you focus on active monitoring. With Tornado you can do exactly the opposite and focus on passive monitoring. You receive events from different channels like SNMP Trap, Syslog, Email and match them against a rule engine and decide which action to associate. A very common use case is to set a Icinga2 Service status (critical, warning, ok) based on a matched rule. In addition you could also subscribe the Icinga API Stream and define matching rules which you would like to correlate and associate an executor for example create a new entry in Elasticsearch. Another common use case could be to register Tornado as a webhook for example in Elasticsearch Watcher collect the alarms and set the status on a Icinga Service Check. During the talk I will explain why Tornado was built from Würth Phoenix in rust and what are the common use case we would like to address with it.
On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast. On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast.
OSMC 2011 | Safed as an agent for supporting a central collection of events w...NETWAYS
Für eine zentrale Sammlung / Überwachung von Log-Informationen (Microsoft Events, Log Dateien bei Linux) wird oftmals das SYSLOG Protokoll mit einem zentralen Syslog Server (rsyslog, syslog-ng) eingesetzt. Safed wurde von Seiten Würth Phoenix auf Basis Snare und Epilog unter der GPL Lizenz weiterentwickelt, um die fehlenden Funktionalitäten im Open Source Umfeld zu schließen. Aus den zwei Agents Snare und Epilog wurde ein Agent Safed mit erweiterten Funktionalitäten entwickelt, dessen Möglichkeiten im Vortrag vorgestellt werden.
Weiterhin wird auch die offene Konfigurationsschnittstelle von Safed präsentiert, welche eine Integration von Safed in einem zentralen Konfigurationssystem ermöglicht.
Scientific python programmers adore Pandas due to its many functionalities. In particular, for data manipulation and analysis it offers handy data structures and operations for numerical tables and time series. Combined with the rest of the SciPy stack and scikit-learn (e.g. for Machine Learning Analysis), multiple goals can be achieved. When it comes to on-line data analysis, interaction, or simple data navigation by multiple users, the SciPy stack can be stressed to its limits. It is here where the combination of InfluxDB as a data source and Grafana as a visualization tool have gained increasing awareness in recent years. Both methods of data analysis and visualization have their advantages and drawbacks. My talk will evidence some of them, as well as show what can be gained by combining python-based offline analysis with query language-based online analysis.
OSMC 2013 | End User Experience Monitoring with Al'exa by Georg KostnerNETWAYS
Der erste Teil der Präsentation wird zeigen, wie wir Nagios und WebInject in eine verteilte AWS EC2 Monitoring Infrastruktur integriert haben. Dies haben wir mit Hilfe von Event Handlers umgesetzt, die zusätzliche Checks an verschiedenen Punkten Schwellenwerte ermitteln und daraufhin einen Status anzeigen. Außerdem rufen wir verschiedene APIs von anderen Monitoring Tools wie Gomez Networks und Pingdom ab und nutzen deren Feeds. Für Benachrichtigungen haben wir CallWithUs (für VoIP Anrufe) und Clickatell für SMS Alarmierungen mit eingebunden.
Der zweite Teil des Talks wird ausführlich beschreiben, wie Hosts aktiviert und deaktiviert werden, Services von Anlagen die automatisch mit Amazon EC2 erzeugt werden und in der Cloud Infrastruktur autoscalieren. Außerdem werde ich aufzeigen, weshalb Host Gruppen so wichtig sind sowie deren kundenspezifische Implementierung. Im Anschluss werden Sie sehen wie Nagvis in Nagios mittels mklive_status broker intergiert wurde, um viele tolle Abbildungen zu erstellen, vor allem automatisch. Dabei werde ich Ihnen zeigen, wie einfach es ist verschiedene Nagios Systeme in einer Abbildung zusammenzufassen, um ein ganzheitliches Bild unseres Systems zu bekommen.
Presentation held during SFScon15 - Free Software Conference, 13.11.2015 @ TIS innovation park, Bolzano
--
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robotframework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports.
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaNETWAYS
Application Performance Monitoring auf Open Source Basis: Wie stark leiden unsere User wirklich?
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robot Framework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports. Auf der diesjährigen OSMC wird Jürgen Vigna die neuesten Funktionen der End-to-End Monitoring Engine vorstellen.
HP Protects Massive, Global Network with StealthWatchLancope, Inc.
Learn how HP relies on StealthWatch, along with its own HP Vertica solution, to:
-improve network visibility and security across its enormously complex, global network
-obtain in-depth information that enables its security teams to act more quickly and minimize potential damage
-quickly detect anomalous activity, such as, DDoS, malware and network misuse
Josh Diakun - Cust Pres - Splunk Partner EventJosh D
Slides from my most recent presentation on how Ive grown & utilize Splunk from my former IT Ops days onward... This was my 6th time doing a customer presentation at a Splunk event. Original copy had my employer's branding, etc but I've removed that to make things simpler, hence some of the ugly empty space :)
Turning Pets into Cattle: A Demonstration to Provoke DiscussionStephen Walli
There have been lots of discussions in the cloud world about traditional 3-tier application workloads that are highly managed (i.e. Pets) and their modern web-counterpart workloads that are scalable, resilient, and fault tolerant (i.e. Cattle). But how does one migrate business critical applications from a "simple" virtualized world into a hybrid-cloud based on OpenStack?
This talk walks through moving a running web application from one such virtualized 3-tier world into an OpenStack-based cloud world and the sorts of changes that need to be considered for re-architecting the app and re-deploying it into the cloud. The steps are meant to provoke conversations and should not be considered a recipe book.
Video is here: https://www.openstack.org/summit/tokyo-2015/videos/presentation/turning-pets-into-cattle-a-demonstration-to-provoke-discussion
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Audits, Cyber Forensics and incident response with Velociraptor and Ansible AWX
When Performance Metrics and User Experience Come Together
When performance metrics are combined with active user experience and machine learning, we can gain new insights about why a business critical application is slow, what components are involved, and how this impacts users and hardware.
By interlinking several levels of dashboards, users from different departments can get a more transparent view of the issue and exchange problem related information as easy as sending a hyperlink to a specific dashboard to their colleagues. Thus troubleshooting and root case detection become much easier.
But collecting up to 500 mio datapoints per day per customer is not trivial.
Why Serverless Flink Matters - Blazing Fast Stream Processing Made ScalableHostedbyConfluent
"The shift from batch processing to real-time processing of data is accelerating. Building real-time data applications is a necessity for many businesses as customers expect data to be always up-to-date and their apps to react to changes as they happen. However building and productizing real-time applications is often a complex and lengthy process due to limited serverless options to build such apps.
The introduction of AWS lambdas was a watershed moment in the world of cloud computing. It allowed developers to fire up “fully-managed” computer programs while paying for only when the program ran. Serverless compute comes with three big advantages - improved scalability, reduced cost, and increased flexibility. We’re bringing this same powerful paradigm to real time data processing with Flink in Confluent Cloud. Using this model, users can focus on writing business logic instead of managing nodes and other infrastructure.
Attendees will learn the benefits of serverless and see how it fits into the context of stream processing. We’ll then kick off a demo where we’ll focus on a real world production use case that uses Flink jobs to power an application with extremely low latency."
Similar to NetEye 4 based on Icinga 2 - Icinga Camp Milan 2019 (20)
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023Icinga
Talk by: Blerim Sheqa
We started an initiative to rebuild and upgrade the way how incidents are handled in Icinga. Our approach includes better contact management, easier configuration of notification rules and better accessibility through the Icinga web interface. In this talk we will guide you through our concepts and demonstrate the current state of development.
Extending Icinga Web with Modules: powerful, smart and easily created - Icing...Icinga
Talk by: Nicolas Schneider
At the Icinga Camp Berlin 2023 Nicolas shared his knowledge on how to build modules for Icinga Web. This time he will demonstrate what he has build so far, including extended functionalities to impersonate within Icinga Web, enforce team dashboards and many more.
Infrastructure Monitoring for Cloud Native Enterprises - Icinga Camp Milan 2023Icinga
Talk by: Simone Nocentini and Vladimir Mozharov
Being a manged service provider comes with its very own challenges, especially when it comes to monitoring. In this session we will dive in into Kiratech’s infrastructure to get an overview from the provider and the client perspective, and what it takes to monitor a variety of technologies with Icinga. The strategy contains an approach of deploying Icinga with Ansible for comprehensive visibility and linking it with FreshService for seamless integration. We will have an outlook to future projects including event-driven automations, Icinga-style observability and application monitoring.
Incident management: Best industry practices your team should know - Icinga C...Icinga
Talk by: Birol Yildiz
Developers and OPS engineers face the relentless challenge of responding to incidents swiftly and effectively, ensuring seamless system operations and customer satisfaction. At this talk attendants will learn how to implement proactive alerting strategies, effectively triage incidents, and collaborate seamlessly during high-pressure situations.
Monitoring Cooling Units in a pharmaceutical GxP regulated environment - Icin...Icinga
Talk by: Felix Joussein
Icinga is used to monitor and alert in case of temperature deviations in a GxP (pharmaceutical industry) regulated environment. The holy grale in a laboratpry environment are the study samples (animal but also human). So regulators (EMA, FDA,..) around the world want to ensure, that the sample-stability is at it’s best. To ensure this, depending on the known stability, certain temperature ranges in cooling-units are defined and have to be trackable thourghout the whole lifecycle of such a sample.
SNMP Monitoring at scale - Icinga Camp Milan 2023Icinga
Talk by: Rocco Pezzani and Thomas Gelf
This presentation unveils a new addon component for the Icinga ecosystem, developed in collaboration with Würth Phoenix and with the support of Irideos. It enables distributed SNMP network monitoring for large segmented networks, capable of monitoring huge numbers of devices in near real-time, while displaying trend graphs for sensor and performance metrics.
An interactive MIB browser with distributed SNMP polling support and some nice network device visualization components will also be shown.
Monitoring Kubernetes with Icinga - Icinga Camp Milan 2023Icinga
Talk by: Eric Lippmann
We recently started researching and developing a Module for Icinga to monitor Kubernetes environments. During the past months we learned a lot about the platform and how we can monitor Kubernetes with Icinga efficiently. In this talk I will present our challenges but also the progress that we made. The talk will include a sneak peak into the current state of the Module and outline our vision of monitoring Kubernetes with Icinga.
Current State of Icinga - Icinga Camp Milan 2023Icinga
Talk by: Bernd Erk
This talk is a summary of all news and updates of the last months. We will cover all relevant fields and share updates about the current state of Icinga.
Efficient IT operations using monitoring systems and standardized tools - Ici...Icinga
Talk by: Magnus Lübeck
This talk will discuss Icinga as the “one stop shop” for finding the “single truth of systems state”. KMG Group use a “four field” model when designing systems, where Icinga have an important place in a section called “technical monitoring/technical performance monitoring”. We touch two methodologies (MOPS – Metrics, Operational tools, Processes, and Metrics), and Ted Dziuba’s actionable response to monitoring events.
Talk by: Simon Gerber
Signalilo is a small webhook server for ingesting Prometheus alerts into Icinga2. Our motivation for creating Signalilo was to integrate alerts from existing Prometheus-based monitoring suites (e.g. for OpenShift Container Platform) into our company-wide Icinga2. Signalilo is currently deployed on 10 OpenShift clusters and forwards Prometheus alerts to Icinga2.
In this talk, I will present the basic design of Signalilo and give a short overview of how we use Signalilo in our production monitoring to forward Prometheus alerts to Icinga2.
Moving from Icinga 1 to Icinga 2 + Director - Icinga Camp Zurich 2019Icinga
Talk by: Christof Hanke
The Max Planck Computing and Data Facility (MPCDF, formerly known as RZG) is using Icinga / Nagios for more than 10 years now. We have/had several instances for different areas, such as miscellaneous servers, clusters or even EU-Projects spanning several European sites. This talk is about our (still ongoing) transition from our icinga1 installation for general servers which is based on many config-files, changed by two people only, to a director based self-service. The goal is that our fellow admins can integrate new hosts by a few steps. The configuration is declarative. In the host-object they just choose templates and fill in fields and arrays. The actual icinga2-configuration is then done via apply-rules.
Icinga Director and vSphereDB - how they play together - Icinga Camp Zurich 2019Icinga
Talk by: Thomas Gelf
While the Icinga Director is the main configuration tool for Icinga, vSphereDB is a completely different beast. Icinga models everything around Hosts and Services, vSphereDB instead discovers your whole VMware infrastructure and builds a huge and deep inventory.
This talk wants to explain the reasoning behind this, shows what’s possible right now and where those powerful Icinga components are heading to in the near future.
Integrating Icinga 2 and ntopng - Icinga Camp Milan 2019Icinga
Talk by Simone Mainardi:
Icinga2 offers useful checks when it comes to monitoring hosts and services in the network. It can ping, test HTTP and DNS services, or establish network connections to make sure everything is up and running. However, such checks are not always enough to ensure the network is operating smoothly with healthy hosts and services. Can you be sure there is no unwanted traffic towards hosts believed to be malicious? What about unencrypted communications and weak TLS? Why has the throughput of an host surged today?
This talk discusses how Icinga2 can be integrated with ntopng to bring network checks a step forward. ntopng, a widely-known network visibility tool, will be used in combination with Icinga2 to create a framework for the timely detection of unwanted or suspicious activities in the network, beyond basic up-or-down checks.
DevOps monitoring: Best Practices using OpenShift combined with Icinga & Big ...Icinga
Talk by Marco Bizzantino:
In my talk I will demonstrate how monitoring works with the DevOps approach. Within an organisation, different people with different roles need to have a complete view over the whole infrastructure. One of the greatest benefits of Icinga is its ability to integrate with various tools and modules to satisfy the company’s requests. An example is OpenShift monitoring. I will point out the most important parts of monitoring OpenShift infrastructure while maintaining it’s complexity. In my approach I will show how we combine Icinga, Prometheus, Grafana and Elasticsearch for an overall OpenShift monitoring solution. Additional examples will show the benefits of using Icinga’s Business Process modelling to add more value to the result.
Best of Icinga Modules - Icinga Camp Milan 2019Icinga
Talk by Bernd Erk:
Humans are creatures of habit – we have our environments, our tasks, our routine. Building up a routine takes a lot out of us – so as soon as we find something that works for us we stick with it. But is it effective? Are there tools that can make our life so much easier if we manage to integrate them into our routine? Of course, we’re in IT, there are always new and good tools! Only 2 more hurdles to clear – find the right tools for you and actually make the effort to integrate them into your routine.
The purpose of this talk is to help you with exactly that – I will show you the most important quality-of-life modules and add-ons for Icinga.All of them officially supported by the Icinga team and super easy to integrate into your system!
hallenges of Monitoring Big Infrastructure - Icinga Camp Milan 2019Icinga
Talk by Blerim Sheqa:
Most monitoring environments are automated with configuration management tools like Puppet, Chef or Ansible. While these tools solve many problems, such as the initial setup, reproducibility and visibility, there are many other challenges that need to be tackled to truly monitor big environments. As a vendor of monitoring software, Icinga came up with unique approaches to solve some extraordinary problems to monitor large scale infrastructures. The methods are a result of real world problems as seen in the wild and applicable to many scenarios.
Discover the real user experience with Alyvix - Icinga Camp Milan 2019Icinga
Talk by Rocco Pezzani:
Rocco Pezzani in his presentation will describe how the integration between Icinga and Alyvix enables the visualization of test case performance data in NetEye. Alyvix is a Open Visual Synthetic Monitoring solution, able to automate any application, interacting with GUIs (Graphic User Interface) exactly as a human would do. Alyvix gives two different outputs: the timing of each single action and a report of test cases transactions in HTML pages, showing potential anomalies occurred in a gif format.
Current State of Logmanagement with Icinga - Icinga Camp Stockholm 2019Icinga
Talk by Thomas Widhalm:
You want to collect your logs in one place and be alerted when there’s something going on an active check can’t find out? This talk is about the different ways of how to connect Icinga to the Elastic Stack from easily done to very sophisticated. As a bonus you will learn about how to parse Icinga logs with Logstash.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.