Barracuda Networks provides a comprehensive portfolio of security solutions for Microsoft Azure and Office 365, including web application firewalls, next-generation firewalls, email security, archiving, backup, and load balancing solutions. As the first security vendor enabled in the Azure marketplace, Barracuda aims to help customers securely adopt cloud technologies, optimize productivity, and ensure compliance. The document outlines Barracuda's cloud security products and capabilities, as well as use cases for multi-tier networking, ExpressRoute integration, remote access, and email security for Office 365.
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...Plain Concepts
Charla impartida en evento Protección y seguridad en entornos de Cloud Hibrida con Azure y O365 sobre El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras amenazas by Barracuda
Análisis de riesgos en Azure y protección de la informaciónPlain Concepts
Charla impartida en evento Protección y seguridad en entornos de Cloud Hibrida con Azure y O365 sobre Análisis de riesgos en Azure y protección de la información by Plain Concepts
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Amazon Web Services
Securing DoD workloads in the cloud is no task to be taken lightly. Today's ever-changing threat landscape requires the advanced capabilities of Palo Alto Networks VM-Series Next Generation Firewall to secure your AWS deployment. Granular security controls based upon users, their applications and the content within those applications give you complete visibility into, and control over, the "who" (via User-ID), and "what" (via App-ID) of your cloud traffic while preventing both known and unknown threats. Coupled with Palo Alto Networks and Amazon's Secure Cloud Computing Architecture (SCCA) Quick Start deployment template, the process of attaining your accreditation is greatly streamlined. Automate your deployment on AWS with many required SCCA security controls both pre-configured and documented at the time of deployment. This session will relate the capabilities that Palo Alto Networks Next Generation Firewall brings to the cloud- including a product demonstration conducted on a VM-Series firewall running on AWS. The target audience is technical security practitioners and information assurance professionals who want to understand the capabilities of Palo Alto Networks on AWS, prevent data breaches, and efficiently attain their accreditation. Learn More: https://aws.amazon.com/government-education/
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Learn how to gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
Join us to Learn:
How to protect and automate your AWS deployments while maintaining data segregation
Best practices for creating consistent security for data moving to and from the cloud
How to securely extend your application development testing environment to AWS
Speakers:
AWS Speaker: David Wright, Solution Architect
Palo Alto Networks Speaker: Bisham Kishnani, Senior Consulting Engineer
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...Plain Concepts
Charla impartida en evento Protección y seguridad en entornos de Cloud Hibrida con Azure y O365 sobre El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras amenazas by Barracuda
Análisis de riesgos en Azure y protección de la informaciónPlain Concepts
Charla impartida en evento Protección y seguridad en entornos de Cloud Hibrida con Azure y O365 sobre Análisis de riesgos en Azure y protección de la información by Plain Concepts
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Amazon Web Services
Securing DoD workloads in the cloud is no task to be taken lightly. Today's ever-changing threat landscape requires the advanced capabilities of Palo Alto Networks VM-Series Next Generation Firewall to secure your AWS deployment. Granular security controls based upon users, their applications and the content within those applications give you complete visibility into, and control over, the "who" (via User-ID), and "what" (via App-ID) of your cloud traffic while preventing both known and unknown threats. Coupled with Palo Alto Networks and Amazon's Secure Cloud Computing Architecture (SCCA) Quick Start deployment template, the process of attaining your accreditation is greatly streamlined. Automate your deployment on AWS with many required SCCA security controls both pre-configured and documented at the time of deployment. This session will relate the capabilities that Palo Alto Networks Next Generation Firewall brings to the cloud- including a product demonstration conducted on a VM-Series firewall running on AWS. The target audience is technical security practitioners and information assurance professionals who want to understand the capabilities of Palo Alto Networks on AWS, prevent data breaches, and efficiently attain their accreditation. Learn More: https://aws.amazon.com/government-education/
Up-front design of your AWS account can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Secure by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability to meet the compliance needs across multiple industry verticals (e.g. HIPAA, FISMA, PCI, etc.). This will include operational reporting through the use of AWS services (e.g. Config/Config Rules, CloudTrail, Inspector, etc.) as well as partner integration capabilities with partner solutions such as Splunk and Allgress for real-time governance, risk, and compliance reporting. Key takeaways from this session include: learning AWS Security best practices and automation capabilities for securing your environment, Automation accelerators for configuration, compliance, and audit reporting using CloudFormation, Config/Config Rules, CloudTrail, Inspector, etc., and ISV integration for real-time notification and reporting for security, compliance, and auditing in the cloud.
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Learn how to gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
Join us to Learn:
How to protect and automate your AWS deployments while maintaining data segregation
Best practices for creating consistent security for data moving to and from the cloud
How to securely extend your application development testing environment to AWS
Speakers:
AWS Speaker: David Wright, Solution Architect
Palo Alto Networks Speaker: Bisham Kishnani, Senior Consulting Engineer
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
Slides from my presentation at Azure Saturday on 26.5.2018 in Munich.
In this session, I will cover the Secure DevOps Toolkit for Azure, a set of security-related tools, Powershell modules, extensions and automations for Azure. The session is a collection of lessons learned using the Toolkit from real-life projects.
After this sessions you will be able to improve the security of your Azure usage from IDE to Operations, regardless of your current state of security and level of cloud adoption.
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
As more SaaS businesses come online it is critical they follow security architecture and operational best practices. The changing regulatory framework from agencies such as SEC, FTC and other agencies requires SaaS companies to implement security best practices.
Understand AWS best practices for Distributed Denial of Service (DDoS) resiliency and how AWS Shield can assist you to protect your business. Uncover how this tool safeguards web applications running on AWS, and how always-on detection and automatic inline mitigations minimize application downtime and latency.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited. Learn More: https://aws.amazon.com/government-education/
Succeeding with Secure Access Service Edge (SASE)Cloudflare
With the emergence of the Secure Access Service Edge (SASE), network and security professionals are struggling to build a migration plan for this new platform that adapts to the distributed nature of users and data.
SASE promises to reduce complexity and cost, improve performance, increase accessibility and enhance security. The question is: How do you gain these benefits as you work towards implementing a SASE architecture? View to learn:
-Why SASE should be less complicated than many vendors are making it
-What to look for when evaluating a migration to a SASE platform
-A 3 month, 6 month, and 12 month roadmap for implementation
-How Cloudflare One, a purpose-built SASE platform, delivers on these promised benefits
Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
Trend Micro: This talk examines an overarching security strategy for your deployment, pulled from the real-world experiences of top companies around the world. Paired with services like AWS Lambda, this strategy can result in a unified view of your deployment and automatically respond to incidents – regardless of scale.
CCI2019 - Architecting and Implementing Azure Networkingwalk2talk srl
Una conoscenza approfondita dei vari aspetti legati al networking di Azure è fondamentale per implementare cloud ibridi in modo sicuro e allo stesso tempo funzionale. In questa sessione saranno esplorati a 360° gli elementi chiave da tenere in considerazione per realizzare architetture di rete ibride, sfruttando al meglio i vari servizi offerti dalla piattaforma Azure, al fine di realizzare la miglior integrazione con l’ambiente on-premises, senza mai trascurare la sicurezza. Durante l’intervento si scenderà nel dettaglio di architetture di rete ibride avanzate, mostrando esempi reali, frutto di un'esperienza diretta sul campo.
By Francesco Molfese
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
Slides from my presentation at Azure Saturday on 26.5.2018 in Munich.
In this session, I will cover the Secure DevOps Toolkit for Azure, a set of security-related tools, Powershell modules, extensions and automations for Azure. The session is a collection of lessons learned using the Toolkit from real-life projects.
After this sessions you will be able to improve the security of your Azure usage from IDE to Operations, regardless of your current state of security and level of cloud adoption.
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
As more SaaS businesses come online it is critical they follow security architecture and operational best practices. The changing regulatory framework from agencies such as SEC, FTC and other agencies requires SaaS companies to implement security best practices.
Understand AWS best practices for Distributed Denial of Service (DDoS) resiliency and how AWS Shield can assist you to protect your business. Uncover how this tool safeguards web applications running on AWS, and how always-on detection and automatic inline mitigations minimize application downtime and latency.
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
The Department of Defense's Secure Cloud Computing Architecture (SCCA) guidance provides DoD mission owners the security requirements for building a DoD compliant and secure application environment in the cloud. This session will review the DoD Cloud Security Requirements Guide and the DoD SCCA pillars and how they apply to AWS services. We will demonstrate how to build a DoD SCCA environment through automation and configuration management tools as well as discuss how to document security controls implementations. We will answer common questions, such as: how do we connect to a DoD Cloud Access Point? How do we implement a least privilege access control model? And how do we automate security event notifications and remediate issues? This session is designed for both technical and information assurance professionals that want to understand the process to move DoD systems into AWS, secure them, and get them accredited. Learn More: https://aws.amazon.com/government-education/
Succeeding with Secure Access Service Edge (SASE)Cloudflare
With the emergence of the Secure Access Service Edge (SASE), network and security professionals are struggling to build a migration plan for this new platform that adapts to the distributed nature of users and data.
SASE promises to reduce complexity and cost, improve performance, increase accessibility and enhance security. The question is: How do you gain these benefits as you work towards implementing a SASE architecture? View to learn:
-Why SASE should be less complicated than many vendors are making it
-What to look for when evaluating a migration to a SASE platform
-A 3 month, 6 month, and 12 month roadmap for implementation
-How Cloudflare One, a purpose-built SASE platform, delivers on these promised benefits
Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
Trend Micro: This talk examines an overarching security strategy for your deployment, pulled from the real-world experiences of top companies around the world. Paired with services like AWS Lambda, this strategy can result in a unified view of your deployment and automatically respond to incidents – regardless of scale.
CCI2019 - Architecting and Implementing Azure Networkingwalk2talk srl
Una conoscenza approfondita dei vari aspetti legati al networking di Azure è fondamentale per implementare cloud ibridi in modo sicuro e allo stesso tempo funzionale. In questa sessione saranno esplorati a 360° gli elementi chiave da tenere in considerazione per realizzare architetture di rete ibride, sfruttando al meglio i vari servizi offerti dalla piattaforma Azure, al fine di realizzare la miglior integrazione con l’ambiente on-premises, senza mai trascurare la sicurezza. Durante l’intervento si scenderà nel dettaglio di architetture di rete ibride avanzate, mostrando esempi reali, frutto di un'esperienza diretta sul campo.
By Francesco Molfese
CCI2018 - Azure Network - Security Best Practiceswalk2talk srl
Nell'era moderna del cloud computing, la tendenza è di spostare sempre più frequentemente i propri workload nel cloud pubblico e di utilizzare cloud ibridi. La sicurezza è spesso un elemento inibitore per l’utilizzo di ambienti cloud. Come è possibile strutturare la topologia di rete in presenza di ambienti cloud e renderla sicura ? Si può estendere il proprio datacenter nel cloud mantenendo un elevato livello di sicurezza della rete ? Come garantire un accesso sicuro ai servizi presenti nel cloud e con quali strumenti ? Una delle principali ragioni per utilizzare Azure per le proprie applicazioni e i propri servizi è data proprio dalla possibilità di poter usufruire di un ampio set di funzionalità e di strumenti di sicurezza integrati nella platform. In questa sessione saranno presentate le security best practices in ambito network nel mondo Azure, date da un'esperienza diretta sul campo. Affrontando scenari reali saranno riportate le linee guida e gli accorgimenti utili per utilizzare al meglio le potenzialità presenti nella piattaforma, al fine di strutturare il network in Azure rispettando tutti i principi di sicurezza.
By Francesco Molfese
Today’s multicloud WAN environment is not only complicated–it can expose your business to an ever–expanding threat landscape. Learn how to provide consistent security across clouds, branches, and users. http://bit.ly/2DWBBX8
In this session you will learn why you need to shift from vulnerability detection only to a holistic web application defense strategy. We’ll outline the top three ways to improve your web app security and share how others have developed an integrated, comprehensive strategy that reduces costs and improves the balance between security and app functionality.
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
Para trabajar en un ecosistema digitalmente transformado, los directores de sistemas de información y otros líderes empresariales tienen que navegar en un entorno de amenazas a la seguridad en constante cambio. Las soluciones de Next Gen Security (NGS) son soluciones de seguridad optimizadas para trabajar mejor con la escala masiva y cobertura expansiva de la Tercera Plataforma. Aunque 7 de cada 10 empresas afirman estar en el proceso de implementar una solución más de seguridad de nueva generación, 3 de esos 7 no tendrá éxito por la falta de competencia interna, por lo que el tema de seguridad es cada día más crítico”. Akamai ofrece un rendimiento a escala con la solución de distribución en la nube más grande y confiable del mundo. Sus recursos se escalan de forma que sus clientes no tengan que hacerlo. Akamai tiene una visibilidad sin igual de las propiedades más atacadas en la web y obtiene inteligencia ante amenazas continuamente a partir de inspecciones avanzadas tanto del tráfico bueno como del malo.
Eric Golpe. Security, privacy, and compliance concerns can be significant hurdles to cloud adoption. Azure can help customers move to the cloud with confidence by providing a trusted foundation, demonstrating compliance with security standards, and making strong commitments to safeguard the privacy of customer data. This presentation will educate you in the fundamentals of Azure security as they pertain to the Cortana Analytics Suite, including capabilities in place for threat defense, network security, access control, and data protection as well as data privacy and compliance. Go to https://channel9.msdn.com/ to find the recording of this session.
Organizations that work with a variety of third-parties in a cloud-based environment are challenged with finding a scalable and elastic security solution, that also meets their partners’ regulations and remains easy-to-use. Barracuda delivers cloud-connected security to simplify your IT environment, and their Web Application Firewall is an elastic and scalable solution for AWS that adapts to and deters evolving threats in a cloud environment. Iris Solutions, a multi-national cloud based enterprise software provider, needed to secure their eSignature SaaS with a tool that facilitated elasticity and scalability to help streamline expansion into several different markets, while meeting the strict regulations they encountered. Register for our upcoming webinar to learn why Iris chose to integrate Barracuda Web Application Firewall with AWS Services, such as Amazon CloudWatch, AWS Elastic Load Balancing, and AWS Identity and Access Management, to overcome their challenge without slowing the pace of transactions.
Join us to learn:
• Best practices for securing web-facing applications on AWS
• The features and benefits of using Barracuda WAF on AWS to protect web-facing applications from targeted and automated attacks
• Insights on the flexible deployment options that Barracuda offers to best complement your AWS environment
Who Should Attend:
Directors, Security Managers, Security Engineers, Security Architects, IT System Administrators, System Administrators, IT Administrators, IT Managers, IT Architects, IT Security Engineers, Business Decision Makers
There are four common challenges that CISOs and their security teams struggle with, even in the most secure and mature organizational datacenters – visibility, resilience, defense-in-depth, and automation. Learn how these challenges become benefits of using the AWS Cloud and why Cybersecurity is becoming a driving force behind commercial cloud adoption. This is an executive level presentation that covers key technical concepts and capabilities to meet business security and compliance objectives. Intended audience includes CIOs, CISOs, Technical Managers, senior architects and engineers new to AWS, and Technically-savvy Business Managers.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
Companies moving workloads to the AWS Cloud may look for additional help maintaining PCI Compliance, improving workload visibility, and creating consistent security across their IT environment. Palo Alto Networks’ VM-Series with GlobalProtect helps organizations segment and monitor network traffic coming from thousands of remote data collection devices, helping them ensure PCI Compliance. Join our upcoming webinar to hear Palo Alto Networks and AWS discuss best practices for creating consistent security across hybrid IT environments using VM-Series with GlobalProtect, and how Warren Rogers leveraged it to help achieve PCI Compliance. Leverage VM-Series as a subscription through the AWS Marketplace or as a Bring-Your-Own-License to exert positive control over applications, prevent threats within your application flows, and provide consistent security to your IT environment.
Join us to learn:
• Best practices for enabling application-level segmentation policies for services like Amazon Virtual Private Clouds
• How to help protect your AWS workload deployment from cyber threats while maintaining data segmentation
• How Warren Rogers implemented policies to control and monitor user activity within each defined group
Who Should Attend:
Directors, Security Managers, Security Engineers, Security Architects, IT System Administrators, System Administrators, IT Administrators, IT Managers, IT Architects, IT Security Engineers, Business Decision Makers
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
In this session, attendees will learn about the network control plane in Azure and how to secure both Infrastructure-as-a-Service and Platform-as-a-Service components of Azure.
R y Python con Power BI, la ciencia y el análisis de datos, juntosPlain Concepts
R y Python son lenguajes muy populares hoy en día especialmente para científicos de datos, que los utilizan para prospección, tratamiento y minería de datos y, Power BI es una de las herramientas que más está creciendo en cuanto a utilización y aceptación en el sector de inteligencia de negocios y análisis de datos. La sesión cubre, a través de demos, los puntos en los que ambos enfoques se combinan para sacar mejor partido a los datos con los que contamos. Según sea el caso, vamos a preferir gestionar nuestras tareas desde el mundo de estadísticas y gráficos ofrecido por lenguajes R y Python, el mundo más encaminado al análisis de negocio gestionado con Power BI, o ambos mundos.
Video kills the radio star: e-mail is crap and needed disruptionPlain Concepts
¿Has recibido un e-mail con publicidad? ¿Muchos? ¿Te han suscrito a listas de distribución sin tu consentimiento? ¿Recibes preguntas insoportables? ¿Alguien te ha intentado hacer un phishing? ¿O te ha llamado un familiar porque se ha infectado con un ransomware que le entró por e-mail? ¿Ocultas como un poseso tu dirección de e-mail y número de teléfono para que no te machaquen? Bien, a mí también me ha pasado. Por eso hemos decidido que el e-mail debía sufrir una disrupción definitivamente.
De la misma manera que la llegada del software ha transformado todo tipo de empresas e industrias a lo largo de los últimos 20 años, la Inteligencia Artificial está empezando a redefinir todo tipo de escenarios empresariales. Descubre en esta charla los conceptos básicos de la Inteligencia artificial y descubre los casos de uso más apropiados para tu tipo de empresa. Aprende a realizar el cambio organizacional y cultural necesario para potenciar tu negocio mediante IA.
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelinesPlain Concepts
Rare genetic diseases are very challenging to diagnose, with the average child waiting for diagnosis for 5 years. Next generation genetic sequencing data may hold the key to diagnosis, however analysis can become a paramount task with multiple factors affecting conclusions. Dx29, an AI-assisted platform facilitates this task, allowing the physician to drive the analysis. Dx29 is a free platform developed by Foudation29, in close collaboration with academic groups.
¿Qué es real? Cuando la IA intenta engañar al ojo humanoPlain Concepts
Hoy en día es difícil no hablar de la Inteligencia Artificial y pensar en cómo se ha aplicado para resolver tareas difíciles y repetitivas para el ser humano. Pero en los últimos años, gracias a la llegada de las Redes Generativas Adversariales (GANs), la IA adoptó capacidades creativas que le permiten generar información artificial. Es la era de los Deepfakes, en la que puedes poner tu cara al actor de tu película favorita o ser felicitado por el presidente de los Estados Unidos. En esta charla, veremos gran parte de estas capacidades adquiridas por la IA, algunos ejemplos, y pondremos a prueba nuestro ojo para comprobar si estamos preparados para detectar que es real y que no.
Inteligencia artificial para detectar el cáncer de mamaPlain Concepts
El cáncer de mama es el tipo de cáncer más común entre mujeres y el segundo tipo de cáncer más común, siendo uno de las principales causas de muerte de las mujeres a nivel global. Sin embargo, la probabilidad de curación cuando éste es detectado en estados iniciales, es prácticamente del 100%. La Inteligencia Artificial (IA) puede ser una gran aliada para agilizar el diagnóstico reduciendo eficazmente tanto los tiempos de espera como el número de biopsias necesarias, aumentando de esta forma las probabilidades de curación. En esta charla veremos cómo. ¿Te lo vas a perder?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?Plain Concepts
¿Conoces el impacto real que la IA está teniendo en las empresas y cuáles son los retos a los que se han enfrentado para implementarla con éxito? En esta charla veremos cómo la IA impacta en las diferentes industrias y el retorno de la inversión obtenido. También veremos cuáles son los principales retos a los que se han enfrentado las empresas para incorporar la IA como factor estratégico y las diferentes formas de abordarlos para obtener una implantación firme y estable que acelere el retorno de la inversión.
Gracias a los Cognitive Services ahora podemos añadir inteligencia a nuestras apps de una manera sencilla. La combinación de estos servicios abren un mundo nuevo de posibilidades, por lo que durante esta charla veremos una breve introducción a los distintos servicios para pasar directamente a verlos en acción en aplicaciones y situaciones reales. Se trata de una charla introductoria en la que haremos demos y veremos cómo podemos utilizar estos servicios en nuestro código.
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...Plain Concepts
La guerra por los datos de las familias en los hogares acaba de arrancar, altavoces inteligentes, luces conectadas, etc. En esta sesión veremos como simples datos agregados pueden convertirse en hábitos de gran valor a través de los algoritmos.
AI is the new buzzword, everybody is talking about it and how it will change and influence our lives. When we talk about AI we talk about machines learning from data, exactly like a child is learning from his/her family or the experiences he/she makes. Humans though, while they grow up, can develop biases. Could this happen to an AI too? Starting from a real story, what would happen if a machine learning algorithm learns from a toys catalog?
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...Plain Concepts
En lo sitios web de eCommerce, la recomendación de productos es clave para poder exponer el catálogo completo al usuario. Una estrategia de recomendación sin datos de usuario es la llamada Recomendación basada en contenidos. En ésta se tienen en cuenta las características de los productos para buscar similitudes. En esta charla veremos diferentes formas de calcular la similitud de unos productos concretos, recetas, basadas en Deep Learning y cómo hemos implementado estos algoritmos en Azure. Finalmente, veremos qué problemas hemos detectado y cómo los estamos solucionando.
Revolucionando la experiencia de cliente con Big Data e IAPlain Concepts
La experiencia de cliente continúa siendo el principal desafío al que se enfrentan las empresas en la era digital. La explosión del Big Data y la Inteligencia Artificial permite profundizar en el conocimiento del cliente y facilita la personalización de productos y servicios, estableciendo vínculos más fuertes y duraderos. A través de varios casos de uso reales, mostraremos cómo esta transformación está ya ocurriendo permitiendo a las empresas pioneras cambiar las reglas del juego en sus sectores.
La idea de iniciar un primer proyecto de IA puede ser considerada a priori como una meta imposible, pero el grado de madurez actual de las tecnologías y los equipos permiten iniciarse sin mucha dificultad en un mundo que parece muy complejo. La experiencia de InfoJobs, dejando de banda los detalles mas técnicos, ilustra un caso de éxito tanto en el plano estratégico como de producto.
Recuperación de información para solicitantes de empleoPlain Concepts
Tratar de encontrar ofertas de trabajo que se ajusten a las habilidades de un buscador de empleo se ha convertido en un dolor de cabeza. La recuperación de información ha sido el método utilizado últimamente para ayudar en esta tarea. Con la inclusión de los algoritmos de aprendizaje profundo, la recuperación de información es ahora más poderosa que nunca. Permite el análisis de grandes conjuntos de documentos, haciendo que la predicción sea más precisa, incluso superando las capacidades humanas. En la presente ponencia presentamos las técnicas más avanzadas para la recuperación de información con un aprendizaje profundo y las aplicamos a la tarea de emparejar los currículums de los demandantes de empleo o a búsquedas específicas con las ofertas de empleo existentes más adecuadas.
La nueva revolución Industrial: Inteligencia Artificial & IoT EdgePlain Concepts
¿Te has preguntado alguna vez que podríamos hacer con toda la telemetría que se recoge en fábricas y empresas? Durante esta sesión veremos como aplicar distintas técnicas de Inteligencia Artificial en el sector industrial para mejorar la seguridad y el rendimiento de nuestras instalaciones. Además, veremos una demo en vivo donde podremos observar como nuestro dispositivo IoT puede analizar los datos que recibe y ser capaz de predecir posibles fallos futuros en distintos componentes.
¿Conoces TypeScript? ¿Estás trabajando con Vue? ¡Vamos a por el siguiente nivel! En esta charla vas a aprender como crear aplicaciones reales y escalables utilizando lo mejor de TypeScript y Vue, con super herramientas como Nuxt, Inversify, Vuex etc. Estar continuamente actualizando a tu equipo puede ayudar a tu producto, al mismo equipo y a los proyectos en los que trabajáis.
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...Plain Concepts
En esta charla veremos como podemos utilizar nuestros dispositivos (Raspberry PI) para adelantarnos a posibles fallos que puedan ocurrir en un motor de un avión. Explicaremos como se ha realizado el proceso de entrenamiento y como podemos ejecutar las predicciones en nuestro dispositivo utilizando IoT Edge.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
1. Protección y acceso a tu información y
aplicaciones en Azure y O365
Version 3.0 | May 2016
Miguel López
Country Manager – Iberia
mlopez@barracuda.com
7. You define controls
and security
IN the CloudYour company
Customer’s Responsibility in a Shared
Security Model
Azure takes care of the
Security
OF the Cloud
Azure Platform
Physical
Infrastructure
Network
Infrastructure
Virtualization
Layer
Customer Applications & Content
Network Security
Identity &
Access Control
Operating
Systems / Platform
Data Encryption
8. Barracuda Security Solutions for Microsoft
Accelerating Your Journey to a Safe Cloud
Security
Ensure users, data and
applications are protected
Employ multi-layer security,
data protection technology
Optimize user productivity
Improve company-wide
collaboration and minimize
employee downtime
Compliance
Seamless, unified experience
Continue the same level of
familiarity with the technologies
as workloads are moved from
on-premises to the cloud
Migration
Maximize Azure investment
Overcome potential adoption
challenges to realize the value
of your investment faster
Control
11. Websites are the Least Secured Vector
0%
2%
2%
4%
5%
7%
8%
9%
23%
40%
DoS Attacks
Crimeware
Physical Theft/Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Web App Attacks
FREQUENCY OF INCIDENTS
Source: Verizon Data Breach Report, 2016
12. Web App Threats: the Top Emerging Vector
Percentage of
vulnerabilities that
are web-based
80%
Percentage of
cyberattacks that
target web
applications
75%
Number of malicious
ad impressions
per year
$12B
Number of websites
defaced in the last
five years
$5M
13. Recognized by NSS Labs
A Leader in security effectiveness
99.9%
100%
100%
0.71%
Security effectiveness
Highest Marks
Against evasion techniques
Stability and reliability tests
False positive rate
19. Azure AD Integration
Azure Active Directory integration
for identity
and access management for the
cloud
Application Security
Protecting custom apps from SQL
injection,
cross-site scripting, application
distributed denial-of-service (DDoS)
Load Balancing
Load balancing with persistence for
highly
secure and scalable application
infrastructure
Data Loss Prevention
Inspecting all inbound traffic for
attacks and outbound traffic for
sensitive data
ADFS
Microsoft Active Directory
Federation Services (ADFS) can
provide security as well as pre-
authentication
Most Common Use Cases
20. Dynamic Scaling in Azure
Protect Multiple Applications with Single Cluster of WAFs Use Case – Web Apps
22. Cloud Security Threats
Community gaps
Exploited system
vulnerabilities
Remote access
Barracuda NextGen Firewall F on Azure
The Ultimate Protection Against Network Security Threats
Networking &
Infrastructure
IPS/IDS
Integrated intrusion prevention
URL filtering
User and application aware
IPsec VPNs secure remote connectivity
Dynamically scales with your network
Networking Protection
23. Multi-Tier Architecture
Build secure multi-tier architecture
in Azure to keep a level of
segregation between tiers
VPN Tunnels
Unlimited site-to-site VPN tunnels to
connect two networks protected by
F-Series Firewalls
Traffic Control
Inbound/outbound traffic control while
providing IPS/IDS functionality and
control traffic based on application,
URL, AV, user
Access to Resources
Access to resources in Azure
(unlimited client-to-site VPN, SSL VPN)
ExpressRoute
Visibility and control on all traffic
coming across the ExpressRoute
connection
Most Common Use Cases
25. Use Case – Multi-Tier
Deploying Multi-Tier Architecture in Azure
Secure remote access for
mobile users
• Dedicated VPN clients available for Windows,
Mac, Linux
• Clientless SSL VPN
• Multiple supported protocols: TINA, IPsec, L2TP,
PPTP
Multiple site-to-site
connectivity
• VNET-to-VNET connectivity
• Automatic user ID synchronization across sites
• Supports multiple ISPs
• Built-in WAN optimization
• Full ExpressRoute support
Comprehensive
security enforcement
• Internal and cross-region
network segmentation
• Access control based on user
and instance identity
• Full traffic visibility and monitoring
Use Case – Multi-Tier
26. ExpressRoute Architecture with F-Series
LAN / DC
Public Internet
router network
ER local
network
Transport networks (public / private) Azure VNet
MPLS Router
NGF
on-prem
Express Route
Azure
Gateway
Web Tier
App Tier
FW Tier DB Tier
27. ExpressRoute Architecture with F-Series
LAN / DC
Public Internet
router network
ER local
network
Transport networks (public / private) Azure VNet
MPLS Router
NGF
on-prem
Express Route
Azure
Gateway
Internet
Internet Router
Web Tier
App Tier
FW Tier DB Tier
28. Use Case - ExpressRoute
Protecting Microsoft Azure ExpressRoute
Security
• Encrypts traffic across ExpressRoute
• Prevents direct traffic flow between
applications and the cloud
• Inspects and logs all inbound
and outbound traffic for
reporting purposes
Reliability
• VNET-to-VNET connectivity
• Automatically sets up a VPN for secondary
connection in the
event of failure
• Allows multiple ExpressRoutes;
one primary and one secondary
Intelligence
• Prioritizes traffic from any specified application
and sends it via a configured link
• Blocks specific application traffic from going to
and from Azure
• Allows or denies certain users based on
credentials and access privileges
Use Case – ExpressRoute
29. Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
30. Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
31. Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
TINA VPN Mgmt Tunnels
33. Barracuda Email Security Service
Easy-to-use, cloud-based email security
• Industry-leading spam and virus defense with a long-standing heritage
• Protection against zero-hour and targeted attacks with ADVANCED THREAT
DETECTION
• Agentless Encryption without complicated key management
• Email Continuity Service Ensure business continuity and email user access
up to 96 hours during email server disruptions
• Real-Time-Protection & Threat Intelligence, 24x7 support by Barracuda
Central
• Advanced, granular policy management
• Protection from data loss and reputation damage
34. Block
File or Email
Allow
File or Email
Full system emulation sandbox
Safely open files to identify risks
Remote detonation of malicious payload
Without compromising security at the
expense of user experience
Signatures
Virus Protection
Malware protection
IP reputation
Heuristics (static analysis)
Sandboxing (dynamic analysis)
37. Barracuda Cloud Archiving Service
Cloud-based archiving from Office 365
for compliance and eDiscovery
• 100% cloud-based SaaS (no HW/SW). Unlimited Storage
• Hosted in secure Barracuda Cloud in EMEA
• eDiscovery search, hold, and export
• Import historical data (Exchange/Office 365). PST migration with PST
Enterprise
• Role-based administration
• Full-featured mobile app
• Works with Exchange and Office 365, including hybrid deployment
• Easy management for inactive users
39. Cloud-to-Cloud Backup
Cloud-to-cloud backup option for Office 365
mailboxes, SharePoint Online and OneDrive for
Business
• Protect against accidental deletion
• Set custom retention policies with unlimited storage capacity (daily
retention for ever)
• Automatic or manual backups
• Multi-selection restores
• All-in-one protection for data hosted locally and offsite.
• Integrated management with Backup appliances for local server data
retention (optional)