Learn how HP Fortify On Demand is leveraging Fortify Runtime Protection to protect our own cloud services. See tips and techniques learned from deploying Runtime Protection in the real world, and learn how you can leverage the same technology in your environment without compromising performance or uptime. You’ll come away with tips on deploying, managing, and integrating Fortify Runtime Protection so you can block attacks while providing your developers with line-of-code detail regarding how to close the holes.
You built it; they broke it; now what? In this talk learn how to advance your incident response plan beyond a policy document and into a scalable framework that enables your team to respond, track, and report on incidents of every size by leveraging what professional responders do every single day.
Harry Regan - It's Never So Bad That It Can't Get Worsecentralohioissa
Disaster recovery, emergency response and business continuity plans are usually developed when no disaster exists. We think we’ve covered all contingencies. We think we’ve trained all the appropriate players. We’ve tested. We’ve re-tested. We think we’re ready to face whatever event there is looming out their with our name on it! The real world has a nasty habit of triggering disasters at the least opportune time, often featuring a twist that throws plans into disarray.
This presentation focuses on three real-world plans, each of which with a fatal flaw. We will discuss elements that should be in a plan beyond the normal guidance from the Disaster Recovery Institute (DRI) and a set of actions that should be included in planning and preparation.
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
Security intelligence is only worthwhile if a relevant piece of information is obtained and analyzed in a timely manner and able to aide a rapid decision-making process to mitigate an imminent threat – this capability is part of the new school security approach of Detect, Respond, Resolve with greater efficiency and speed which mid-market enterprises should be benefiting from.
Retail data breaches can have a serious impact on profitability and the costs of a cybersecurity incident may impact the C-Suite as well as consumer trust.
Tripwire’s chief technology officer Dwayne Melançon (@ThatDwayne) and vice president of security products at IDC Charles Kolodgy (@ckolodgy_idc) discuss the current retail cyber threat landscape with a focus on strategies to mitigate the cybersecurity risks and reduce the costs of potential security breaches, including:
- How to identify the early stages of a data breach
- Why point-of-sale and other business-critical systems require a different approach to data security
- How retailers can use the Top 20 Critical Security Controls to make businesses ‘unattractive’ to cybercriminals
- Qualified attendees will earn one CPE credit for participation in this webcast
A recording of the webcast that accompanies this slide deck can be found here: http://www.tripwire.com/register/retail-security-closing-the-threat-gap/
You built it; they broke it; now what? In this talk learn how to advance your incident response plan beyond a policy document and into a scalable framework that enables your team to respond, track, and report on incidents of every size by leveraging what professional responders do every single day.
Harry Regan - It's Never So Bad That It Can't Get Worsecentralohioissa
Disaster recovery, emergency response and business continuity plans are usually developed when no disaster exists. We think we’ve covered all contingencies. We think we’ve trained all the appropriate players. We’ve tested. We’ve re-tested. We think we’re ready to face whatever event there is looming out their with our name on it! The real world has a nasty habit of triggering disasters at the least opportune time, often featuring a twist that throws plans into disarray.
This presentation focuses on three real-world plans, each of which with a fatal flaw. We will discuss elements that should be in a plan beyond the normal guidance from the Disaster Recovery Institute (DRI) and a set of actions that should be included in planning and preparation.
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
Security intelligence is only worthwhile if a relevant piece of information is obtained and analyzed in a timely manner and able to aide a rapid decision-making process to mitigate an imminent threat – this capability is part of the new school security approach of Detect, Respond, Resolve with greater efficiency and speed which mid-market enterprises should be benefiting from.
Retail data breaches can have a serious impact on profitability and the costs of a cybersecurity incident may impact the C-Suite as well as consumer trust.
Tripwire’s chief technology officer Dwayne Melançon (@ThatDwayne) and vice president of security products at IDC Charles Kolodgy (@ckolodgy_idc) discuss the current retail cyber threat landscape with a focus on strategies to mitigate the cybersecurity risks and reduce the costs of potential security breaches, including:
- How to identify the early stages of a data breach
- Why point-of-sale and other business-critical systems require a different approach to data security
- How retailers can use the Top 20 Critical Security Controls to make businesses ‘unattractive’ to cybercriminals
- Qualified attendees will earn one CPE credit for participation in this webcast
A recording of the webcast that accompanies this slide deck can be found here: http://www.tripwire.com/register/retail-security-closing-the-threat-gap/
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
Despite changing threats and the near certainty of compromise, most
IT security programs are much the same as they were a decade ago. How
have attacker motivations and tactics changed, and why? What does
this mean for IT security departments, and how must they adapt?
This webinar will detail the security challenges organizations face
today, the implications of changes in attacker tactics and
motivations, and what firms can do to better align their security
program with today's reality.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Colby Clark, Director of Incident Management, Fishnet Security
The Presentation is about the Basic Introduction to Cybersecurity that talks about introduction and what is security means. Also the presentation talks about CIA Triad i.e confidentiality, integrity and availability
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...SolarWinds
In this presentation, SolarWinds Head Geek™ Leon Adato will explore the ways in which having a visual representation of data makes it more meaningful, intelligible, and actionable. He shows some examples of how data display techniques can help the IT professional in day to day scenarios.
The must have tools to address your HIPAA compliance challengeCompliancy Group
A panel of experts from the companies that were chosen as “5 Key tools to help your organization achieve HIPAA compliance” In this webinar we will highlight ways for you and your organization to use tools to help make the task of HIPAA compliance easier and more effective.
Panelist:
Bob Grant ex HIPAA auditor and CCO of Compliancy Group LLC
Andy Nieto, Health IT Strategist at DataMotion
April Sage Director of Healthcare IT at Online Tech
Asaf Cidon CEO and co-founder of Sookasa
Daryl Glover Exec VP Strategic Initiatives of qliqSOFT
Security intelligence using big data presentation (engineering seminar)Marco Casassa Mont
An overview of R&D work in the space of cyber security, focusing on technologies and case studies in the space of cyber security, big data for security, predictive analytics and usage of security intelligence for better situational awareness
Software Security for Project Managers: What Do You Need To Know?Denim Group
Application-level vulnerabilities have been responsible for a number of very public data breaches and are increasingly a target for a variety of types of attackers. This presentation demonstrates some of the security vulnerabilities that are often introduced during software development projects. It also looks at activities that can help identify these vulnerabilities as well as prevent them from being introduced in the first place. Attendees will take away from the presentation an understanding of software security risks as well as where assurance activities can be included in the project plan to help increase the security of software being developed with a minimum of impact to project schedules and budgets.
This is a high level presentation on how to develop a monitoring improvement program. The topic of what to monitor is covered in a separate presentation.
When a new security vulnerability is identified or during a large-scale attack, accurate and fast coordination is critical. While runbooks exist for many of the technical challenges, executing them in concert and filling the gaps between them requires creativity and quick thinking as well as discipline, a strong ability to read situations, and a willingness to make tough decisions.
As a content delivery network, Fastly operates a large internetwork and a global application environment, which face many security threats. Recognizing the impact security events can have, Fastly developed its Incident Command protocol, which it uses to deal with large-scale events. Maarten Van Horenbeeck, a lead on Fastly’s security team, and experienced incident commanders Lisa Phillips and Tom Daly explore how Incident Command was conceived and the protocols that were developed within Fastly to make it work. The three share a number of war stories that illustrate how Incident Command contributes to protecting Fastly, its customers, and the many end users relying on the service. Examples include a major software vulnerability that affected a Linux component in common use across Fastly and a large attack. Maarten, Lisa, and Tom cover in detail the typical struggles a company Fastly’s size runs into when building around-the-clock incident operations and the things Fastly has put in place to make dealing with security incidents easier and more effective.
Tatsuaki Takebe of Yokogawa Electric Corporation provides the closing keynote with a focus on international standards activity and how it affects the Japanese ICS community.
2014 Top 10 Predictions for BC/DR by Dr. Steven B GoldmanxMattersMarketing
Dr. Steven Goldman discusses his 2014 Top 10 Trends for the Business Continuity/Disaster Recovery Industry.
Topics include:
The increase in world–wide Natural Disasters
The rise in malicious cyber attacks
Embracing interruption as part of ‘day to day’ operations
Speed–of–light Information travel; new levels of expectations
The changing role of the BC/DR professional
Tweeting idiots – Twitiots
Preparing for the Matrix, the Robot Uprising, or Skynet!
and much more…
About Dr. Steven B. Goldman
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. He has over 30 years experience in the various aspects of these disciplines, including program management, plan development, training, exercises, and response strategies. His background is comprehensive yet unique in that he has been a professional engineer, corporate spokesperson, manager of media relations, business continuity planner, crisis responder, consultant, and a Fortune 500 Company's Global Business Continuity Program Manager. Dr. Goldman is a co-founder and Lecturer at MIT's "Crisis Management & Business Continuity" Professional Education summer course.
About xMatters, inc.
xMatters enables any business process or application to trigger two-way communications (text, voice, email, SMS, etc.) throughout the extended enterprise. The company’s cloud-based solution allows for enterprise-grade scaling and delivery during time-sensitive events. More than 1,000 leading global firms use xMatters to ensure business operations run smoothly and effectively during incidents such as IT failures, product recalls, natural disasters, dynamic staffing, service outages, medical emergencies and supply-chain disruption. Founded in 2000 as AlarmPoint Systems, xMatters is headquartered in San Ramon, CA with European operations based in London.
Bethany Mayer
Senior VP & General Manager
HP Networking
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
Despite changing threats and the near certainty of compromise, most
IT security programs are much the same as they were a decade ago. How
have attacker motivations and tactics changed, and why? What does
this mean for IT security departments, and how must they adapt?
This webinar will detail the security challenges organizations face
today, the implications of changes in attacker tactics and
motivations, and what firms can do to better align their security
program with today's reality.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Colby Clark, Director of Incident Management, Fishnet Security
The Presentation is about the Basic Introduction to Cybersecurity that talks about introduction and what is security means. Also the presentation talks about CIA Triad i.e confidentiality, integrity and availability
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...SolarWinds
In this presentation, SolarWinds Head Geek™ Leon Adato will explore the ways in which having a visual representation of data makes it more meaningful, intelligible, and actionable. He shows some examples of how data display techniques can help the IT professional in day to day scenarios.
The must have tools to address your HIPAA compliance challengeCompliancy Group
A panel of experts from the companies that were chosen as “5 Key tools to help your organization achieve HIPAA compliance” In this webinar we will highlight ways for you and your organization to use tools to help make the task of HIPAA compliance easier and more effective.
Panelist:
Bob Grant ex HIPAA auditor and CCO of Compliancy Group LLC
Andy Nieto, Health IT Strategist at DataMotion
April Sage Director of Healthcare IT at Online Tech
Asaf Cidon CEO and co-founder of Sookasa
Daryl Glover Exec VP Strategic Initiatives of qliqSOFT
Security intelligence using big data presentation (engineering seminar)Marco Casassa Mont
An overview of R&D work in the space of cyber security, focusing on technologies and case studies in the space of cyber security, big data for security, predictive analytics and usage of security intelligence for better situational awareness
Software Security for Project Managers: What Do You Need To Know?Denim Group
Application-level vulnerabilities have been responsible for a number of very public data breaches and are increasingly a target for a variety of types of attackers. This presentation demonstrates some of the security vulnerabilities that are often introduced during software development projects. It also looks at activities that can help identify these vulnerabilities as well as prevent them from being introduced in the first place. Attendees will take away from the presentation an understanding of software security risks as well as where assurance activities can be included in the project plan to help increase the security of software being developed with a minimum of impact to project schedules and budgets.
This is a high level presentation on how to develop a monitoring improvement program. The topic of what to monitor is covered in a separate presentation.
When a new security vulnerability is identified or during a large-scale attack, accurate and fast coordination is critical. While runbooks exist for many of the technical challenges, executing them in concert and filling the gaps between them requires creativity and quick thinking as well as discipline, a strong ability to read situations, and a willingness to make tough decisions.
As a content delivery network, Fastly operates a large internetwork and a global application environment, which face many security threats. Recognizing the impact security events can have, Fastly developed its Incident Command protocol, which it uses to deal with large-scale events. Maarten Van Horenbeeck, a lead on Fastly’s security team, and experienced incident commanders Lisa Phillips and Tom Daly explore how Incident Command was conceived and the protocols that were developed within Fastly to make it work. The three share a number of war stories that illustrate how Incident Command contributes to protecting Fastly, its customers, and the many end users relying on the service. Examples include a major software vulnerability that affected a Linux component in common use across Fastly and a large attack. Maarten, Lisa, and Tom cover in detail the typical struggles a company Fastly’s size runs into when building around-the-clock incident operations and the things Fastly has put in place to make dealing with security incidents easier and more effective.
Tatsuaki Takebe of Yokogawa Electric Corporation provides the closing keynote with a focus on international standards activity and how it affects the Japanese ICS community.
2014 Top 10 Predictions for BC/DR by Dr. Steven B GoldmanxMattersMarketing
Dr. Steven Goldman discusses his 2014 Top 10 Trends for the Business Continuity/Disaster Recovery Industry.
Topics include:
The increase in world–wide Natural Disasters
The rise in malicious cyber attacks
Embracing interruption as part of ‘day to day’ operations
Speed–of–light Information travel; new levels of expectations
The changing role of the BC/DR professional
Tweeting idiots – Twitiots
Preparing for the Matrix, the Robot Uprising, or Skynet!
and much more…
About Dr. Steven B. Goldman
Dr. Steven B. Goldman is an internationally recognized expert and consultant in Business Continuity, Crisis Management, Disaster Recovery, and Crisis Communications. He has over 30 years experience in the various aspects of these disciplines, including program management, plan development, training, exercises, and response strategies. His background is comprehensive yet unique in that he has been a professional engineer, corporate spokesperson, manager of media relations, business continuity planner, crisis responder, consultant, and a Fortune 500 Company's Global Business Continuity Program Manager. Dr. Goldman is a co-founder and Lecturer at MIT's "Crisis Management & Business Continuity" Professional Education summer course.
About xMatters, inc.
xMatters enables any business process or application to trigger two-way communications (text, voice, email, SMS, etc.) throughout the extended enterprise. The company’s cloud-based solution allows for enterprise-grade scaling and delivery during time-sensitive events. More than 1,000 leading global firms use xMatters to ensure business operations run smoothly and effectively during incidents such as IT failures, product recalls, natural disasters, dynamic staffing, service outages, medical emergencies and supply-chain disruption. Founded in 2000 as AlarmPoint Systems, xMatters is headquartered in San Ramon, CA with European operations based in London.
Bethany Mayer
Senior VP & General Manager
HP Networking
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Raggiungere nuovi livelli di time-to market ed efficienza: dallo sviluppo, al test, alla produzone in un solo passo.
Gabriele Giacomelli, HP ALM Solution Consultant
Government and Education Webinar: Successfully Migrating Applications to the ...SolarWinds
In this interactive webinar, our Government sales engineers discussed how to successfully migrate your organization’s applications to the cloud. Our sales engineers discussed about moving your applications to the cloud, with considerations such as application portability and existing infrastructure.
Our presenters reviewed and discussed migrating your apps to the cloud and demonstrated how SolarWinds® Server & Application Monitor (SAM), Virtualization Manager (VMAN), and Database Performance Analyzer (DPA) can help support your organization’s migration plans.
During this interactive webinar, attendees learned about: :
• Understand application monitoring challenges for hybrid and multi-cloud environments
• Get a unified view of application performance regardless of where they are deployed
• Leverage SAM’s API integrations to monitor AWS® and Azure® environments
• Deploy custom Windows® and Linux® agents to monitor hybrid or private cloud applications
• Leverage out-of-the-box templates to monitor hundreds of applications, including SaaS applications like Microsoft® Office 365®
• Leverage DPA to monitor all your databases—on-premises, virtualized, and in the cloud
Technical deep dive on Java Micro Edition (ME) 8 (apologies for the partially messed up colors and slides - SlideShare is doing that during the conversion process)
La costante domanda di agilità da parte del Business richiede che l’IT si doti di approcci innovativi incentrati su collaborazione, automazione, interattività.
DevOps e Continuous Delivery rappresentano i nuovi modelli di riferimento per la gestione dell’IT che permettono di conseguire elevati livelli di agilità senza sacrificare qualità e costi.
Facilitating an agile, interative, user-centric approach to digital service creation
This session will reveal the results of our latest survey which looked at digital services and how government organisations are tackling the challenge of delivering world-class digital products that meet people’s needs.
In total, 272 individuals from 163 organisations completed the survey representing central government and associated agencies. One of the key findings was that as part of their digital strategy, the majority of organisations are embracing the government’s move towards agile.
In this session, we will highlight the HP software offerings that facilitate an agile, iterative, user-centric approach to tackling business problems.
Speakers:
Verity Greig, HP Software Sales Specialist & Consultant, Hewlett Packard
Mark Turner – HP Software PreSales, Hewlett Packard
The Changing Role of a DBA in an Autonomous WorldMaria Colgan
The advent of the cloud and the introduction of Oracle Autonomous Database Cloud presents opportunities for every organization, but what's the future role for the DBA? This presentation explores how the role of the DBA will continue to evolve, and provides advice on key skills required to be a successful DBA in the world of the cloud.
La sicurezza della rete non significa solo impedire o bloccare gli attacchi. Attraverso il virtual patching e l'analisi di contenuti e contesti, un ' Next Generation Intrusion Prevention System' puo' fornire una nuova dimensione di Security Intelligence per proteggere il business
Stefano Di Capua, HP Enterprise Secuirity Presales Manager Southern Europe
Government and Education Webinar: Improving Application PerformanceSolarWinds
Learn about SolarWinds® systems management tools to monitor infrastructure and help improve application performance for your organization. SolarWinds systems management tools support on-premises, cloud-based, and hybrid applications.
Discover the origins of big data, discuss existing and new projects, share common use cases for those projects, and explain how you can modernize your architecture using data analytics, data operations, data engineering and data science.
Big Data Fundamentals is your prerequisite to building a modern platform for machine learning and analytics optimized for the cloud.
We’ll close out with a live Q&A with some of our technical experts as well.
Discover the origins of big data, discuss existing and new projects, share common use cases for those projects, and explain how you can modernize your architecture using data analytics, data operations, data engineering and data science.
Big Data Fundamentals is your prerequisite to building a modern platform for machine learning and analytics optimized for the cloud.
We’ll close out with a live Q&A with some of our technical experts as well.
Stretch your brain with a packed agenda:
Open source software
Data storage
Data ingestion
Data analytics
Data engineering
IoT and life after Lambda architectures
Data science
Cybersecurity
Cluster management
Big data in the cloud
Success stories
Presentazione dello speech tenuto da Carmine Spagnuolo (Postdoctoral Research Fellow - Università degli Studi di Salerno/ ACT OR) dal titolo "Technology insights: Decision Science Platform", durante il Decision Science Forum 2019, il più importante evento italiano sulla Scienza delle Decisioni.
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsSolarWinds
In this webinar attendees learned how to use our fault, performance and configuration management tools to improve your IT security posture. Our solutions help manage and monitor network devices and their configurations to enhance risk management, IT security and compliance. Discussions will include simplifying day-to-day operations, increasing automation, and generating reports to verify compliance and highlight violations.
Our federal Sales Engineers reviewed and demonstrated how our tools can help achieve and maintain RMF, FISMA and DISA STIG compliance. Configuration management helps agencies develop, deploy and maintain compliant configurations. Fault, performance, and log management help ensure that devices are continuously monitored and operating correctly. And patch management automates patching to reduce vulnerabilities. Attendees learned how SolarWinds tools can help you:
• Leverage Network Configuration Manager (NCM), and Patch Manager to satisfy security controls or help implement and manage controls
• Utilize NCM, and Log & Event Manager (LEM), our powerful SIEM, to verify that controls have been implemented correctly
• Employ LEM, Network Performance Monitor, and NCM to monitor that controls are working as expected
• Quickly and easily produce out-of-the-box compliance reports for DISA STIGS, FISMA, and more
Similar to Runtime Protection in the Real World (20)
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
This talk is a case study in how FOD faced a unique problem and the solution we arrived at. It is a story of dogfooding and balancing operations with security.
We are an Application Security company. We bake security into every facet of our SDLC, but nothing is ever perfect. In the perfect world, every build goes through rigorous fucntional, security, and user acceptance testing. We all know that right now our companies aren’t in the perfect world. This is the real world. In the real world things break. We find new bugs when users take actions or supply data we didn’t expect. We face ever changing tactics from determined attackers that have time on their side. We are responsible for satisfying performance metrics and keeping things running.
With these goals and responsibilities there will come a time when that emergency patch has to go out right now and it probably missed a security gate somewhere along the way.
The problem is Application Security is hard. Process is excellent but you have to place the correct controls in the right place to catch when process fails.
The first thought that came to mind is, “Why not WAF?” There is a whole industry around securing web applications. This industry centers on the idea that we can’t just filter the network anymore. We have to protect the application. This is great when you don’t expect your users to send attack traffic to you, but what if you expect exactly that? What if normal traffic is your users sending large amounts of attack data at your site?
WAF won’t cut it in this scenario. You’re left either leaving portions of your code unprotected or blocking normal users. Both scenarios are equally bad.
This talk is a case study in how FOD faced a unique problem and the solution we arrived at. It is a story of dogfooding and balancing operations with security.
RTA is the solution to our problem. RTA hooks directly into our CLR and provides deep insight into what is happening as untrusted data traverses our application. The false positive rate after initial tuning is near zero and we are leveraging standard FOD rulepacks.
RTA is the solution to our problem. RTA hooks directly into our CLR and provides deep insight into what is happening as untrusted data traverses our application. The false positive rate after initial tuning is near zero and we are leveraging standard FOD rulepacks.
RTA is the solution to our problem. RTA hooks directly into our CLR and provides deep insight into what is happening as untrusted data traverses our application. The false positive rate after initial tuning is near zero and we are leveraging standard FOD rulepacks.
RTA is the solution to our problem. RTA hooks directly into our CLR and provides deep insight into what is happening as untrusted data traverses our application. The false positive rate after initial tuning is near zero and we are leveraging standard FOD rulepacks.
RTA is the solution to our problem. RTA hooks directly into our CLR and provides deep insight into what is happening as untrusted data traverses our application. The false positive rate after initial tuning is near zero and we are leveraging standard FOD rulepacks.
If you can recommend other Protect sessions to your audience, please include a slide like this one.