Salesforce Security Review Tips and TricksRyan Flood
Building on the Salesforce platform means having access to our world-class security team. Join us to hear from our resident security experts and learn how you can leverage important tools and resources to build a secure app. Understand the purpose and payoff of having your app reviewed and learn how to streamline the process. #DF17Partners
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?Kenny Buntinx
Enterprise Mobility (EM) is high on the agenda of the market, that’s crystal clear by now.Let’s explore during this session the unique offering that Microsoft has to deliver you the ultimate end-to-end EM experience.
Enterprise Mobility is much more than Mobile Device Management, discover how you can take the extra mile with Microsoft’s EMS. In this session I will explain and demonstrate you all the pieces of the EM(S) puzzle. It’s all about the experience, that’s what it’s all about.
Top 10 Tips for Securing and Scaling Atlassian CloudAtlassian
Atlassian Cloud presents a unique set of challenges for any admin, whether you're a seasoned SaaS administrator, or just beginning your cloud journey.
In this session, we'll share Atlassian's top recommendations for governance, user management, and security for our cloud products. Learn what to do, and what to avoid when administering Atlassian Cloud for the enterprise.
Microsoft 365 Certification - How to become Enterprise Administrator ExpertAmmar Hasayen
Learn how to become Microsoft 365 Certified Enterprise Administrator Expert, what exams you should pass, and what is the best certification path for your specific job role and skill sets.
Microsoft is changing their exams and certification program and there are a lot of new set of certifications and exams that can be confusing to understand at first. I am going to save you time and effort and explain it all to you in this presentation.
After completing this presentation, you will have the knowledge necessary to choose your next exams and get your Microsoft 365 Certified Enterprise Administrator Expert badge.
In this presentation you are going to learn:
- Overview about the new Microsoft certification Program
- What are these new Badges (Fundamental, Associate and Expert)
- Which exams to take to get the Microsoft 365 Certified Enterprise Administrator Expert badge?
- Which certifications match you job role and years of experience.
Future of Your Atlassian Platform - Data Center and Cloud MigrationAUGNYC
Worried about the end of server and have detailed, in-depth enterprise questions that are not answered in FAQs about cloud or data center migration? Want to communicate your concerns to the Atlassian decision makers? Join an ACE session with Cameron Deatsch, CRO and Partha Kamal, Head of Cloud Migrations, for in-depth technical talk about the future of your Atlassian platform.
he vast majority of security breaches take place when attackers gain access to an environment by stealing a user’s identity. Over the years, attackers have become increasingly effective in leveraging third party breaches and using sophisticated phishing attacks. As soon as an attacker gains access to even low privileged user accounts, it is relatively easy for them to gain access to important company resources through lateral movement.
In this demo heavy session, you will learn how Azure Identity Protection, Azure Multi-Factor Authentication (Azure MFA) and the Microsoft Enterprise Mobility + Security (EMS) suite can help you to protect and secure corporate data and identities in the cloud.
Continuous Compliance is achievable, provided you leverage the cloud infrastructure APIs and applying Continuous Monitoring to your deployed resources. Here's how Evident.io is doing cloud security right.
Web APIs are a primary target for malicious attacks on you and your digital assets. This presentation provides some effective API security approaches such as identifying API risks in business ecosystems, quaality and safety of APIs, and the risk from connected devices aka Internet of Things
Akamai Security World Tour Stockholm May 14, 2019 by Gerd Giese
Salesforce Security Review Tips and TricksRyan Flood
Building on the Salesforce platform means having access to our world-class security team. Join us to hear from our resident security experts and learn how you can leverage important tools and resources to build a secure app. Understand the purpose and payoff of having your app reviewed and learn how to streamline the process. #DF17Partners
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?Kenny Buntinx
Enterprise Mobility (EM) is high on the agenda of the market, that’s crystal clear by now.Let’s explore during this session the unique offering that Microsoft has to deliver you the ultimate end-to-end EM experience.
Enterprise Mobility is much more than Mobile Device Management, discover how you can take the extra mile with Microsoft’s EMS. In this session I will explain and demonstrate you all the pieces of the EM(S) puzzle. It’s all about the experience, that’s what it’s all about.
Top 10 Tips for Securing and Scaling Atlassian CloudAtlassian
Atlassian Cloud presents a unique set of challenges for any admin, whether you're a seasoned SaaS administrator, or just beginning your cloud journey.
In this session, we'll share Atlassian's top recommendations for governance, user management, and security for our cloud products. Learn what to do, and what to avoid when administering Atlassian Cloud for the enterprise.
Microsoft 365 Certification - How to become Enterprise Administrator ExpertAmmar Hasayen
Learn how to become Microsoft 365 Certified Enterprise Administrator Expert, what exams you should pass, and what is the best certification path for your specific job role and skill sets.
Microsoft is changing their exams and certification program and there are a lot of new set of certifications and exams that can be confusing to understand at first. I am going to save you time and effort and explain it all to you in this presentation.
After completing this presentation, you will have the knowledge necessary to choose your next exams and get your Microsoft 365 Certified Enterprise Administrator Expert badge.
In this presentation you are going to learn:
- Overview about the new Microsoft certification Program
- What are these new Badges (Fundamental, Associate and Expert)
- Which exams to take to get the Microsoft 365 Certified Enterprise Administrator Expert badge?
- Which certifications match you job role and years of experience.
Future of Your Atlassian Platform - Data Center and Cloud MigrationAUGNYC
Worried about the end of server and have detailed, in-depth enterprise questions that are not answered in FAQs about cloud or data center migration? Want to communicate your concerns to the Atlassian decision makers? Join an ACE session with Cameron Deatsch, CRO and Partha Kamal, Head of Cloud Migrations, for in-depth technical talk about the future of your Atlassian platform.
he vast majority of security breaches take place when attackers gain access to an environment by stealing a user’s identity. Over the years, attackers have become increasingly effective in leveraging third party breaches and using sophisticated phishing attacks. As soon as an attacker gains access to even low privileged user accounts, it is relatively easy for them to gain access to important company resources through lateral movement.
In this demo heavy session, you will learn how Azure Identity Protection, Azure Multi-Factor Authentication (Azure MFA) and the Microsoft Enterprise Mobility + Security (EMS) suite can help you to protect and secure corporate data and identities in the cloud.
Continuous Compliance is achievable, provided you leverage the cloud infrastructure APIs and applying Continuous Monitoring to your deployed resources. Here's how Evident.io is doing cloud security right.
Web APIs are a primary target for malicious attacks on you and your digital assets. This presentation provides some effective API security approaches such as identifying API risks in business ecosystems, quaality and safety of APIs, and the risk from connected devices aka Internet of Things
Akamai Security World Tour Stockholm May 14, 2019 by Gerd Giese
Started in 1994, American Megatrends India Private Limited (AMIPL) offers hi-tech engineering solutions and services to customers worldwide.
Today, we are globally equipped with cutting-edge technological expertise and extensive experience. We offer a portfolio of solutions and services in the fields of embedded, mobility, storage and asset management.
We develop a platter of flexible and personalized solutions and services such as BIOS, hardware diagnostic software, remote server management, GPS Tracking system, device driver / firmware development, storage solutions, infrastructure asset management and platform validation
AMIPL is uniquely positioned to provide all the fundamental components necessary to offer complete system performance, manageability and availability for today's enterprise computing requirements.
We are specialty leaders in Embedded Services, BIOS Customization & Porting, Mobility Solutions, IP SAN/NAS Data storage solutions, Infrastructure Asset Management, Telematics Solutions, Knowledge Management System, Healthcare IT solutions, Platform Validation Services, Android Services.
In this presentation, we consolidate top M365 tips to make your Microsoft environment more effective. Such as:
* How to harden your admin accounts
* How to better understand licensing around security features of Microsoft 365, and what is required
* How to segment your Microsoft 365 tenant to support a delegated administration model
* How to focus on the various layers of service, data, and information security for administrators
* How to get a better handle on Shadow IT and external data sharing
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
Are you asking yourself how do I take my inhouse application and make it available to internal users, partners or customers using SSO and access management technologies? Oh, and you don't want it to be a 6 month project? No problem. Come and find out how to leverage your existing investments and move to modern standards like OpenID Connect, without having to rip and replace infrastructure. Learn the capabilities and tradeoffs you can make to deploy the right level of identity and access management infrastructure to match your security needs.
DevSecOps is propelling forward-thinking organizations by doing something simple – fostering collaboration of seemingly contradictory teams to align their disparate goals into a singular effort.
Another Atlassian 'summit' is completed, summer is beckoning and we are all eager to take on some new projects, right? Join us as Andrew and Dileep, NYCE ACE Community Leaders, present all the top announcements and highlights of Team 21 and Jean-Phillipe Comeau, Adaptavist, discusses how you can 'translate' your favorite ScriptRunner scripts and bring automation to the cloud.
Getting access to your information in Microsoft 365 starts with logging in but is it secure as it could be? Understanding security options at the point of entry like MFA, Legacy Authentication and Conditional Access on all devices is critical to keeping information protected as it is not only you that is trying to log into your account these days! Learn what security technologies you can add at login and the best practices approaches to configuring and monitoring these. Security starts at the doorway to Microsoft 365 and simple configurations can greatly reduce your risks of unauthorised access. Come and learn what can be done.
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
Michael Farrington and Jarrod Kingston are back for the 5th installment of the Salesforce Admin Hack Series, showing you how to improve user experience in salesforce.com by "hacking" the User object
Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights:
• Cisco pxGrid support/integration – check if users/identities are logged on to network
• Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications
• Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2
• Push-to-Accept – new authentication method
• Updated product theme – Clean new sleek design
SAM and Security Teams Must Join Forces to Enhance SecurityFlexera
There is a critical relationship between Software Asset Management and Vulnerability Management. Many aspects of the work to manage software assets have a direct impact on the security and risk profile of organizations. If you work in Software Asset Management: “whether you realize it or not, you play an important role in Information and IT Security.” And, you also collect and manage a wealth of data that is critical to identifying software vulnerabilities and mitigating security risk.
Organizations that are able to leverage software asset inventory data combined with software vulnerability data can rapidly address the most critical cybersecurity threats and stay ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers, keeping their business protected from threats like ransomware and out of the infamous data breach news.
View these slides to see how these two disciplines—Software Asset Management and Security, can work together to help organizations be more efficient and more secure.
Office 365 - Disruption or Transformation
Microsoft has been polishing its Online Service offerings since the early 2000’s through its original Business Productivity Online Suite (BPOS) which has later become what we now know as Office 365.
It’s been a shaky road since 2010 but finally we are seeing remarkable technology come through Office 365 and into the hands of all users. By unpacking what is possible within the suite, companies are fence sitting as to whether it is Disruption or Transformation.
So, what do you think it is?
Let’s unload and explore the pro’s and con’s of what customers are experiencing and the strategic direction of Microsoft.
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS December 2019 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on security. Video recording is available at www.ciaopsacademy.com
The Cloud promises - Global Azure Bootcamp Paris 2019Alex Danvy
The Cloud promises.
Keynote of the Global Azure Bootcamp 2019 in Paris on April 27th.
The cloud promises of lot of benefit (AI everywhere, IAAS replacement with PAAS) but also some side effects (IT jobs at risk). I took a look back and gave some perspectives.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
Centralized session management has long been a goal of Web Access Management systems: the idea that one session can give end users access to dozens of protected applications with a seamless SSO experience, and terminating it (either by the end user themselves, or by an administrator) cuts off access instantly. It’s a nice dream isn’t it? Turns out that while most WAM products claim they can do this, when deployment time comes around (especially in globally distributed organizations) serious security and scalability challenges emerge that make it unfeasible. In this “session”, come and learn our vision for deploying session management at scale and see how Ping Identity has implemented it in our Federated Access Management solution.
Crafting Your Oracle License, Contract and Vendor Management StrategyFlexera
Organizations using Oracle products face strategic decisions in shifting to the cloud and addressing digital transformation. The shift to the cloud presents significant opportunities and concerns for your long term on-premises software strategy. View these slides to learn more.
Mark Diodati, Ping Identity
An exploration of three specific trends—the inevitability of adaptive identity (and its impact on APIs), requirements for enterprise-grade IDaaS, and the great challenges of hybrid identity governance—along with recommendations for enterprises that are leaning into modern identity
Started in 1994, American Megatrends India Private Limited (AMIPL) offers hi-tech engineering solutions and services to customers worldwide.
Today, we are globally equipped with cutting-edge technological expertise and extensive experience. We offer a portfolio of solutions and services in the fields of embedded, mobility, storage and asset management.
We develop a platter of flexible and personalized solutions and services such as BIOS, hardware diagnostic software, remote server management, GPS Tracking system, device driver / firmware development, storage solutions, infrastructure asset management and platform validation
AMIPL is uniquely positioned to provide all the fundamental components necessary to offer complete system performance, manageability and availability for today's enterprise computing requirements.
We are specialty leaders in Embedded Services, BIOS Customization & Porting, Mobility Solutions, IP SAN/NAS Data storage solutions, Infrastructure Asset Management, Telematics Solutions, Knowledge Management System, Healthcare IT solutions, Platform Validation Services, Android Services.
In this presentation, we consolidate top M365 tips to make your Microsoft environment more effective. Such as:
* How to harden your admin accounts
* How to better understand licensing around security features of Microsoft 365, and what is required
* How to segment your Microsoft 365 tenant to support a delegated administration model
* How to focus on the various layers of service, data, and information security for administrators
* How to get a better handle on Shadow IT and external data sharing
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
Are you asking yourself how do I take my inhouse application and make it available to internal users, partners or customers using SSO and access management technologies? Oh, and you don't want it to be a 6 month project? No problem. Come and find out how to leverage your existing investments and move to modern standards like OpenID Connect, without having to rip and replace infrastructure. Learn the capabilities and tradeoffs you can make to deploy the right level of identity and access management infrastructure to match your security needs.
DevSecOps is propelling forward-thinking organizations by doing something simple – fostering collaboration of seemingly contradictory teams to align their disparate goals into a singular effort.
Another Atlassian 'summit' is completed, summer is beckoning and we are all eager to take on some new projects, right? Join us as Andrew and Dileep, NYCE ACE Community Leaders, present all the top announcements and highlights of Team 21 and Jean-Phillipe Comeau, Adaptavist, discusses how you can 'translate' your favorite ScriptRunner scripts and bring automation to the cloud.
Getting access to your information in Microsoft 365 starts with logging in but is it secure as it could be? Understanding security options at the point of entry like MFA, Legacy Authentication and Conditional Access on all devices is critical to keeping information protected as it is not only you that is trying to log into your account these days! Learn what security technologies you can add at login and the best practices approaches to configuring and monitoring these. Security starts at the doorway to Microsoft 365 and simple configurations can greatly reduce your risks of unauthorised access. Come and learn what can be done.
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
Michael Farrington and Jarrod Kingston are back for the 5th installment of the Salesforce Admin Hack Series, showing you how to improve user experience in salesforce.com by "hacking" the User object
Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights:
• Cisco pxGrid support/integration – check if users/identities are logged on to network
• Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications
• Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2
• Push-to-Accept – new authentication method
• Updated product theme – Clean new sleek design
SAM and Security Teams Must Join Forces to Enhance SecurityFlexera
There is a critical relationship between Software Asset Management and Vulnerability Management. Many aspects of the work to manage software assets have a direct impact on the security and risk profile of organizations. If you work in Software Asset Management: “whether you realize it or not, you play an important role in Information and IT Security.” And, you also collect and manage a wealth of data that is critical to identifying software vulnerabilities and mitigating security risk.
Organizations that are able to leverage software asset inventory data combined with software vulnerability data can rapidly address the most critical cybersecurity threats and stay ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers, keeping their business protected from threats like ransomware and out of the infamous data breach news.
View these slides to see how these two disciplines—Software Asset Management and Security, can work together to help organizations be more efficient and more secure.
Office 365 - Disruption or Transformation
Microsoft has been polishing its Online Service offerings since the early 2000’s through its original Business Productivity Online Suite (BPOS) which has later become what we now know as Office 365.
It’s been a shaky road since 2010 but finally we are seeing remarkable technology come through Office 365 and into the hands of all users. By unpacking what is possible within the suite, companies are fence sitting as to whether it is Disruption or Transformation.
So, what do you think it is?
Let’s unload and explore the pro’s and con’s of what customers are experiencing and the strategic direction of Microsoft.
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS December 2019 webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on security. Video recording is available at www.ciaopsacademy.com
The Cloud promises - Global Azure Bootcamp Paris 2019Alex Danvy
The Cloud promises.
Keynote of the Global Azure Bootcamp 2019 in Paris on April 27th.
The cloud promises of lot of benefit (AI everywhere, IAAS replacement with PAAS) but also some side effects (IT jobs at risk). I took a look back and gave some perspectives.
Community IT CTO Matthew Eshleman reviews security fundamentals in Office 365. Small and medium sized nonprofits are in a great position to take advantage of the native security tools offered in Office 365.
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
Centralized session management has long been a goal of Web Access Management systems: the idea that one session can give end users access to dozens of protected applications with a seamless SSO experience, and terminating it (either by the end user themselves, or by an administrator) cuts off access instantly. It’s a nice dream isn’t it? Turns out that while most WAM products claim they can do this, when deployment time comes around (especially in globally distributed organizations) serious security and scalability challenges emerge that make it unfeasible. In this “session”, come and learn our vision for deploying session management at scale and see how Ping Identity has implemented it in our Federated Access Management solution.
Crafting Your Oracle License, Contract and Vendor Management StrategyFlexera
Organizations using Oracle products face strategic decisions in shifting to the cloud and addressing digital transformation. The shift to the cloud presents significant opportunities and concerns for your long term on-premises software strategy. View these slides to learn more.
Mark Diodati, Ping Identity
An exploration of three specific trends—the inevitability of adaptive identity (and its impact on APIs), requirements for enterprise-grade IDaaS, and the great challenges of hybrid identity governance—along with recommendations for enterprises that are leaning into modern identity
CIS13: Authorization Agent (AZA) Mobile ProtocolCloudIDSummit
Observe the state of the AZA protocol interop. AZA leverages OpenID Connect to provide a standards-based approach for SSO to multiple native applications.
Mobile computing has grown at an unprecedented rate in recent years while innovations in identity and Single Sign-On (SSO) on mobile have lagged behind. We'll look at the state of mobile application SSO including applicable standards such as OAuth 2.0, OpenID Connect, etc., some best and worst practices in use today, and the availability of relatively new features in the major mobile operating systems that stand to improve the situation for developers and users alike. Bad jokes and gratuitous photographs will be liberally interspersed with actual content.
About the presenter:
As a Distinguished Engineer for Ping Identity, Brian Campbell aspires to one day know what a Distinguished Engineer actually does for a living. In the meantime, he's tried to make himself useful with little things like designing and building much of PingFederate, the product that put Ping Identity on the map. When not making himself useful, he contributes to various identity and security standards including a two-year stint as co-chair of the OASIS Security Services Technical Committee (SAML) and contributions to OAuth, JOSE and COSE in the IETF as well as OpenID Connect. He holds a B.A., magna cum laude, in Computer Science from Amherst College in Massachusetts. Despite spending four years in the state, he has to look up how to spell "Massachusetts" every time he writes it.
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
Whether you want to give users single sign-on to SaaS applications, create a solution with the PingOne IDaaS and PingFederate identity bridge, or simply take advantage of the CloudDesktop, this bootcamp is for you.
Today enterprise solutions adopt products and services from multiple cloud providers in order to accomplish various business requirements. This means that it is no longer sufficient to maintain user identities only in corporate LDAP. In most cases, SaaS providers also need dedicated user accounts created for the cloud service users, which raises the need of identity provisioning mechanisms to be in place.
Security Testing is deemed successful when the below attributes of an application are intact
- Authentication
- Authorization
- Availability
- Confidentiality
- Integrity
- Non-Repudiation
Testing must start early to minimize defects and cost of quality. Security testing must start right from the Requirements Gathering phase to make sure that the quality of end-product is high.
This is to ensure that any intentional/unintentional unforeseen action does not halt or delay the system.
Testing web services is very important part of integration testing on web projects.
In this presentation you can learn the best approaches, tools and features of Web Services testing. Soon I'll share url with a video from my presentation.
Security in the cloud is fundamentally different. Not so much due to the technology--though there's plenty of differences there--but more with respect to the way that security is applied and how it's run.
Over the past few years, we've seen a radical shift in how development and operational teams work together. Security teams have been left out in the cold and are still viewed as the "No" team.
It doesn't have to be that way.
Cloud technologies have enabled new work flows and models for businesses and other teams...security is no different. We just have to wake up and take advantage of the new ecosystem.
When security teams embrace change, the boundaries start to dissolve and security can finally be built in instead of bolted on.
In this session, we'll look at some of the challenges involved in this shift, how it impacts your teams, your skill set, and how a modern approach to defence will improve your security posture.
Presented at BC Aware Day, 31-Jan-2017
SnapLogic Elastic Integration Platform as a Service (iPaaS)Darren Cunningham
Integration is at the heart of every successful Social, Mobile, Analytics (Big Data), Cloud and the Internet of Things (SMACT) initiative. A modern integration platform as a service (iPaaS) must be fast to deploy and easy to use. It must be able to handle a variety of patterns, styles and endpoints. It must be able to connect to cloud and on-premises applications and data sources. And a modern cloud integration platform must be elastic in order to scale out as more capacity is needed. The SnapLogic integration platform as a service (iPaaS) eliminates the need to choose between multiple tools and teams for application, process and data integration, allowing you to instantly access and stream data, regardless of its location, size, and type.
SnapLogic Overview: Are You Feeling SMACT?SnapLogic
Are you feeling SMACT? Social. Mobile. Analytics and Big Data. Cloud Computing. The Internet of Things. What an amazing and disruptive time it is in the world of data. But with so much innovation, and change, are you ready to handle the new integration requirements of the modern enterprise? We call this the Integrator’s Dilemma. Whether it’s Salesforce, ServiceNow, Workday, or other cloud applications connecting to each other and on-premises systems like SAP and Oracle, or Hadoop platforms like Cloudera and Hortonworks for big data analytics, there is a growing demand to allow “citizen integrators” to access, transform and deliver the data they need when they need it.
This presentation reviews the new data, application and API integration challenges and point to the solution that CIOs across a number of industries are turning to in order to stay connected and run at cloud speed.
To learn more, visit: http://www.snaplogic.com/ipaas
Single Sign-On: Our Path to Password EliminationSymantec
By eliminating the password sprawl that cloud applications can cause, we freed our employees from having to create a dozen or more logins and passwords just to do their jobs.
Achieve Compliance with Security by Default and By DesignAmazon Web Services
The era of racks filled with hardware is over. The cloud offers numerous benefits, but perhaps the most profound improvement is to security and compliance. When security and compliance is codified, it transforms from an “after-the-fact” struggle, to a proactive, foundational component of the enterprise.However, you cannot merely forklift on-premise security into the cloud. That never works. Security must be written into the deployment and configuration code. Security must adopt DevOps practices. In this presentation, Ignacio Martinez, VP of Compliance at Smartsheet will discuss how his company achieved FedRAMP compliance in record time, with the help of Anitian and Trend Micro. Anitian CEO, Andrew Plato will then describe how using the power and scale of cloud automation can dramatically accelerate security and compliance.
ALTITUDE 2019 | Enabling Productivity with Agile SecurityBetterCloud
It’s a fine line to give users control over settings and their data, but not too much control. In this session, you’ll learn how Chad Ponder, VP Technology Service and Support at United Capital, Mark Bowling, Remote Chief Information Security Officer at United Capital, and Colin McCarthy, VP of Global IT at Essence, are creating workflows that give their users the flexibility they need to do their jobs, without compromising security.
SailPoint is a centralized identity management solution that allows organizations to manage employee authorizations, digital identities, data security, network management, compliance, and more. CyberArk is used to access local admin accounts, domain admin accounts, service accounts, and other privileged accounts simply and safely.
Innovating Government: Building a Culture of DevSecOps for Rapid and Secure M...Amazon Web Services
An executive focused journey with United States Customs and Immigration Services (USCIS) as they build a culture of DevSecOps to rapidly and securely modernize government services. We look at building culture, staff, and practices to achieve mission success by moving security from a blocker to an enabler. In addition, we explore how AWS performs security, and show how agencies like USCIS prove it is a viable model.
With the recent release of Mule 4, WHISHWORKS, MuleSoft and Flyin.com got together to discuss what’s new in Anypoint Platform’s new engine and how to streamline the migration from Mule 3 to Mule 4.
The agenda included:
Customer Success Story
What’s new in Anypoint Platform
What’s new in Mule 4
Upcoming Mule 4 Migration toolkits:
- MuleSoft Application Migration Toolkit
- WHISHWORKS Custom Migration Toolkit
Migrating Mule 3 Connectors to Mule 4 with Mule SDK
- Demo
Adapting Mule 4
Creating an Effective Roadmap for Your Cloud Journey (ENT225-R1) - AWS re:Inv...Amazon Web Services
The Cloud Journey Workshop is an experiential session that works through a representative use case of a company's cloud adoption journey. In this session, participants divide into teams, and each team makes practical recommendations for how to plan and execute their journey to the cloud so they can meet business expectations. By participating, you learn best practices on organization transformation, cloud foundations establishment, migration methodology, and application landscape optimization from AWS facilitators. You also have the opportunity to share tips with other AWS customers to make your cloud journey successful.
Live Demo: Accelerate the integration of workday applicationsSnapLogic
This slide deck focuses on a deep dive into cloud application integration – specifically how SnapLogic accelerates the integration of Workday applications into modern enterprise environments. Watch the live demo here: https://youtu.be/vFa06tvEkHM
Join featured speaker, Ohad Yehudai, senior solutions engineer at SnapLogic and learn why hundreds of customers across the Global 2000 – rely on SnapLogic to automate business processes, accelerate analytics, and drive digital transformation.
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
Join us, and learn how we made AWS our backbone, modularized our software for the cloud, and gained an immediate surge in velocity. In this session, we walk you through some of the unexpected security challenges we faced and hopefully save you a few headaches. Discover what security issues you need to address, how to avoid costly unused instances in your deployments, and why your current security tools won’t help. We show you how a major transformation landed us on AWS, and we share how we overcame challenges and advanced our business while innovating in a new direction. This session is brought to you by AWS partner, Barracuda Networks Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
1. Securing and scaling SaaS
Real world example solving the need for
access management, compliance and
SSO of SaaS enterprise applications
2. The Company: High technology manufacturer
! quot; Case study: High tech leader in Silicon Valley
! quot; Public company
! quot; Growing distributed workforce
! quot; Use 10 enterprise SaaS applications
! quot; Use Active Directory for employees
! quot; Small IT team means focus on innovation not
maintenance
3. “ These SaaS apps are like
“
mushrooms popping up all over the
company.
IT Security
Manager
4. The Challenge: Mushroom Management
! quot; Provide secure user access to multi-vendor SaaS
apps for 500 employees and 2,500 partners
! quot; Control access to mission critical data and apps
running in the cloud
! quot; Demonstrate compliance controls are in place by next
audit
! quot; Integrate enterprise Active Directory to SaaS apps to
automate the management of access
! quot; Provide SSO to both SAML and HTTP logon apps
6. “ We realized that SSO was just a
part of the equation. Without
“
access controls we wouldn’t be
able to show compliance.
IT Security Manager
7. The Journey
! quot; Could enterprise WAM solve it?
! quot; Could federation software solve it?
! quot; Could Active Directory solve it?
! quot; Would SSO be enough?
! quot; We tried home grown scripts but…
! quot; We used spreadsheets to manage user accounts
8. “ We looked at 4 approaches. Only
Symplified was able to meet all our
“
requirements for access management,
compliance and SSO.
VP of Information Technology
9. The Solution
Symplified Access
! quot; Access management for internal and external users
! quot; Compliance – audit and controls
! quot; Active Directory integration – extends management
Symplified KeyChain
! quot; Secure user access to SaaS and enterprise apps
! quot; No software agents, federation kits, plug-ins
! quot; SAML and HTTP secure federation
Symplified SinglePoint
! quot; Instant integration with Symplified SaaS ecosystem
! quot; Utility architecture – cloud native design
! quot; 24x7 monitoring and management from SAS 70 facilities
11. “Because everything is already integrated
in SinglePoint, it was simple to validate
“
our selection. In less than 2 weeks we
knew Symplified would work.
VP of Information Technology
12. SinglePoint Pre-Integrates Security Across Cloud AND Enterprise
Symplified provides an iTunes Store like experience to select which SaaS
apps you want to integrate security with.
Simply click to ‘activate’ an integration
Works across both the enterprise and the cloud
13. Mash-Up Cloud Platforms with Enterprise – No Coding!
No coding is required.
Symplified tightly
integrates the SaaS
platform into your
security system.
Symplified is running in
days not months!
14. The Results
Simple Solution
! quot; 8 apps secured with a single solution
! quot; Automated access management through Active Directory
! quot; Compliance now takes 1 day down from weeks
! quot; Risk reduced with scalable access policies enforced
! quot; Eliminates zombie account access
Pre-integrated Architecture
! quot; Rapid deployment in days
! quot; Managed solution allows IT to focus on core not
maintenance
! quot; Integration management eliminated
15. The Symplified Team
Founders are a proven team with
40+ years of combined identity Financing - $6.0 million Series A
experience.
!quot; Eric Olden - Chairman & CEO ! quot; Chris McKay - Granite Ventures
!quot; Jonti McLaren - President & COO ! quot; Spencer Tall - Allegis Capital
!quot; Darren Platt - CTO and VPE ! quot; Todd Rowe - GM Mid-Market, SAP
!quot; Jason Merrick – VP Business Dev
!quot; Josh Forman - VP Customer
Success Advisory Board
»quot; Taher Elgamal - inventor of SSL
! quot; Team founded and grew Securant, »quot; Simon Peel - CMO Cast Iron
IAM solution targeting Fortune 500
»quot; John Bara - SVP Citrix
! quot; Securant acquired by RSA Security
for $140M »quot; Bruce Heubner - fmr GM Microsoft
! quot; Team was central in development of
SAML standard through AuthXML
16. Next Steps
Schedule a demo with a Symplified architect
! quot; How Symplified Access and Symplified
KeyChain work in a one-to-one demo
Email or call Symplified
! quot; jmerrick@symplified.com
! quot; 303-318-4188