Most businesses operate on cloud-based and on-premises servers. This hybrid environment allows for easy access to important data but often creates complexity in properly managing and securing your assets. Now consider IoT devices on your network, and this hybrid environment becomes nearly impossible to maintain.
Scott Crawford, Research Director at 451 Research, and David Meltzer, Chief Technology Officer at Tripwire, discuss how to simplify modern network complexities with essential security controls.
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
In this presentation, we use the pets vs. cattle analogy to discuss migrating to the cloud, including some challenges you may encounter with security and compliance, and considerations when selecting foundational controls.
The Subversive Six: Hidden Risk Points in ICSTripwire
n the past, Industrial Control Systems (ICS) were separate from other business technologies, operating as on-premise systems. However, as ICS becomes more dependent on IT infrastructures and devices for command and control functions, new unforeseen risks are being discovered.
Industrial cyber security experts from Tripwire, FireEye and Tofino/Belden examine the six key weaknesses attackers use to compromise critical infrastructure and industrial controls operation. You will get real-life threat breakdowns and mitigation options available to proactive security teams.
Key Takeaways:
· Learn how to protect legacy ICS systems not designed with security in mind
· Understand the risks associated with an interconnected OT environment
· Discover available remediation options to your system's vulnerabilities
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
This year has been full of surprises — and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.
In this webinar, Eric Kedrosky, CISO and director of cloud research at Sonrai Security, dissects the top 10 notorious cloud data breaches from 2020, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of data breach, what we can learn, what allowed the data breach to happen and the preventative measures.
Join this webinar as we dissect the year’s top cloud data breaches and what caused them, including:
Identity and authentication for data storage
Public cloud misconfiguration
Key and secret management
Overprivileged identities
Malicious Bad Actors
Building Elastic into security operationsElasticsearch
Learn how Optiv took foundational ideas around optimization of data ingestion, automation, and search to build world-class managed cybersecurity services with Elastic.
Keynote: Elastic Security evolution and visionElasticsearch
SecOps teams are taking on more responsibility than ever as online activity increases from a newly remote workforce, accelerating the need for digital transformation. Learn how Elastic Security has evolved to help SecOps teams take a broader, more inclusive approach to security and set their organisations up for success. Plus, hear the vision for what’s next.
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
In this presentation, we use the pets vs. cattle analogy to discuss migrating to the cloud, including some challenges you may encounter with security and compliance, and considerations when selecting foundational controls.
The Subversive Six: Hidden Risk Points in ICSTripwire
n the past, Industrial Control Systems (ICS) were separate from other business technologies, operating as on-premise systems. However, as ICS becomes more dependent on IT infrastructures and devices for command and control functions, new unforeseen risks are being discovered.
Industrial cyber security experts from Tripwire, FireEye and Tofino/Belden examine the six key weaknesses attackers use to compromise critical infrastructure and industrial controls operation. You will get real-life threat breakdowns and mitigation options available to proactive security teams.
Key Takeaways:
· Learn how to protect legacy ICS systems not designed with security in mind
· Understand the risks associated with an interconnected OT environment
· Discover available remediation options to your system's vulnerabilities
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
This year has been full of surprises — and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.
In this webinar, Eric Kedrosky, CISO and director of cloud research at Sonrai Security, dissects the top 10 notorious cloud data breaches from 2020, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of data breach, what we can learn, what allowed the data breach to happen and the preventative measures.
Join this webinar as we dissect the year’s top cloud data breaches and what caused them, including:
Identity and authentication for data storage
Public cloud misconfiguration
Key and secret management
Overprivileged identities
Malicious Bad Actors
Building Elastic into security operationsElasticsearch
Learn how Optiv took foundational ideas around optimization of data ingestion, automation, and search to build world-class managed cybersecurity services with Elastic.
Keynote: Elastic Security evolution and visionElasticsearch
SecOps teams are taking on more responsibility than ever as online activity increases from a newly remote workforce, accelerating the need for digital transformation. Learn how Elastic Security has evolved to help SecOps teams take a broader, more inclusive approach to security and set their organisations up for success. Plus, hear the vision for what’s next.
Operationalize with alerting, custom dashboards, and timelinesElasticsearch
See how Elastic gives your security team customized visualizations and workflows you need to improve efficiency, streamline collaboration, and truly operationalize your security insights.
Keynote: Elastic Security evolution and visionElasticsearch
Learn how Elastic Security has evolved to help SecOps teams take a broader, more inclusive approach to security and set their organizations up for success.
Cloud Security for Dummies Webinar — The Identity EditionNetskope
Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special “Identity Edition” of the Cloud Security for Dummies webinar series.
In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on:
- Finding and assessing risk of all cloud apps running in your enterprise
- Onboarding new apps and bringing them into the secure Single Sign On fold
- Using identity to enable access and enforce usage and content policies
- Dealing with security issues such as poor reputation users and compromised accounts
- Communicating and coaching users
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
Let’s face it: When it comes to data loss prevention, we’re not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesn’t even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following:
- Trends surrounding cloud and data loss prevention
- How on-premises DLP users have helped shape the design of new, cloud-based solutions
- Key architectural considerations for enterprises who have invested in on-premises DLP
- Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
One of today's biggest cloud trends is enterprise adoption of the Microsoft Office 365 suite. There is one wrinkle, though. Your business wants to move quickly to get immediate value, while your security team needs to proceed a little more cautiously to ensure they can govern usage and protect sensitive data. Can organizations move quickly and instrument the proper controls?
Join Adrian Sanabria, Senior Security Analyst from 451 Research, Shamiana Soderberg, Senior Business Development Manager Cloud Productivity from Microsoft, and Jamie Barnett, CMO of Netskope for a look at safe enablement best practices for Office 365, and the role Cloud Access Security Brokers play in this effort.
Attendees will come away with the ten real-world requirements that every organization should consider when adopting a sanctioned cloud productivity suite like Office 365. These requirements will address areas like:
- Granular administrative and user controls across the Office 365 suite
- DLP for content “at rest” within and “en route” to or from the suite
- Usage and data governance within the suite and its ecosystem
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoElasticsearch
Ajusta tus procesos de respuesta ante incidentes monitoreando la falta de cumplimiento, alertando sobre actividad atípica y personalizando exploraciones para automatizar las acciones de respuesta. Ve cómo Elastic le brinda a tu equipo de seguridad las visualizaciones y flujos de trabajo personalizados que necesitas para mejorar la eficiencia, optimizar la colaboración y poner realmente en funcionamiento la información de seguridad.
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
Jamie Barnett from Netskope describes how to enable SaaS while Securing Data. For more information about netskope, see: https://www.wesecure.nl/producten/netskope/
Elastic Security: Enterprise Protection Built on the Elastic StackElasticsearch
Elastic Security provides global data threat prevention, collection, detection, and response. Learn how to outpace the adversaries with multi-layered technology, see live demos, and get answers to all your questions.
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
To watch the full Making Cloud Security Part of Your DNA webinar video, please go to: https://resources.netskope.com/h/i/65967799-making-cloud-security-part-of-your-dna
Summary:
As Chief Security Officer for leading cancer diagnostic company Genomic Health, Craig Guinasso makes cloud a strategic advantage while solving some of today’s most complex security challenges.
Join Craig, along with Sanjay Beri, CEO of Netskope, Missy Krasner, Managing Director of Healthcare at Box, and David Baker, CSO of Okta, for a webinar on the top five strategies that healthcare technology leaders should adopt to get the most out of the cloud while also protecting patient health data and keeping their organizations compliant.
In this powerpoint, you will get a glimpse into the webinar where we discussed how to:
- Think about cloud services in relation to business objectives
- Triage Shadow IT and consolidate on the most enterprise-ready cloud services
- Create checks and policies to identify and prevent PHI leaks
- Turn their business stakeholders into security champions
5 Highest-Impact CASB Use Cases - Office 365Netskope
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.
This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises.
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
This discussion will detail best practices and recommendations for using your Application Performance Management / Network Performance Management solutions. The focus is to work in tandem and compliment existing Cyber Security solutions.
Automate threat detections and avoid false positivesElasticsearch
Eliminating blind spots means you now have enough context. But can you get important insights from that context when you need it? Learn how to detect threats — while avoiding the noise of false positives — with the detection engine in Elastic Security. You’ll see how to automate threat detection via correlations and machine learning, with real-world examples of each.
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
AWS, Azure and Google Cloud have disrupted the traditional infrastructure market. After realizing that security is a major roadblock to cloud adoption, they are putting money and effort to built-in security features. But hybrid setups remain a challenge for companies and there is a learning curve for security teams to be proficient on cloud. Find out how to choose the best toolset to secure your data in the cloud.
Elastic Security: Your one-stop OODA loop shopElasticsearch
Elastic Security, leveraging the expertise of the makers of Elasticsearch coupled with the subject matter experts of the security domain, brings enterprise-grade SIEM and response to all users. With Elastic Security and the Elastic Agent, users can search, see, and stop threats, adding the critical “act” step in the OODA loop cycle. Learn how to take control of your environment and see what Elastic Security has in store next.
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
As government agencies expand the use of cloud services, security continues to be a top priority for program managers, policymakers, and cloud service providers (CSPs). Governments and agencies worldwide are moving workloads with varying levels of sensitivity to the cloud. This session will feature agency-level security risk management practices and address common myths about security in the cloud. Participants will gain insight into how governments are leveraging cloud computing to improve their security posture and more quickly benefit from economies of scale.
Mark Ryland, Chief Solutions Architect, Amazon Web Services, WWPS
Problems:
- What Security Products Do We Really Need & Don’t?
- How do we Identify Gaps & Overlaps in Portfolio?
- How do we define our Security Products Strategy?
- What security products can be replaced or dropped?
- How do we understand & categorize security vendors using a standardized approach?
- How do we make the optimal use of my existing cybersecurity products portfolio?
Operationalize with alerting, custom dashboards, and timelinesElasticsearch
See how Elastic gives your security team customized visualizations and workflows you need to improve efficiency, streamline collaboration, and truly operationalize your security insights.
Keynote: Elastic Security evolution and visionElasticsearch
Learn how Elastic Security has evolved to help SecOps teams take a broader, more inclusive approach to security and set their organizations up for success.
Cloud Security for Dummies Webinar — The Identity EditionNetskope
Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special “Identity Edition” of the Cloud Security for Dummies webinar series.
In this panel-style discussion, the experts will compare notes, debate approaches, and share stories from the cloud security and identity and access management front lines. IT security professionals will walk away with best practices on:
- Finding and assessing risk of all cloud apps running in your enterprise
- Onboarding new apps and bringing them into the secure Single Sign On fold
- Using identity to enable access and enforce usage and content policies
- Dealing with security issues such as poor reputation users and compromised accounts
- Communicating and coaching users
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
Let’s face it: When it comes to data loss prevention, we’re not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesn’t even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following:
- Trends surrounding cloud and data loss prevention
- How on-premises DLP users have helped shape the design of new, cloud-based solutions
- Key architectural considerations for enterprises who have invested in on-premises DLP
- Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
One of today's biggest cloud trends is enterprise adoption of the Microsoft Office 365 suite. There is one wrinkle, though. Your business wants to move quickly to get immediate value, while your security team needs to proceed a little more cautiously to ensure they can govern usage and protect sensitive data. Can organizations move quickly and instrument the proper controls?
Join Adrian Sanabria, Senior Security Analyst from 451 Research, Shamiana Soderberg, Senior Business Development Manager Cloud Productivity from Microsoft, and Jamie Barnett, CMO of Netskope for a look at safe enablement best practices for Office 365, and the role Cloud Access Security Brokers play in this effort.
Attendees will come away with the ten real-world requirements that every organization should consider when adopting a sanctioned cloud productivity suite like Office 365. These requirements will address areas like:
- Granular administrative and user controls across the Office 365 suite
- DLP for content “at rest” within and “en route” to or from the suite
- Usage and data governance within the suite and its ecosystem
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoElasticsearch
Ajusta tus procesos de respuesta ante incidentes monitoreando la falta de cumplimiento, alertando sobre actividad atípica y personalizando exploraciones para automatizar las acciones de respuesta. Ve cómo Elastic le brinda a tu equipo de seguridad las visualizaciones y flujos de trabajo personalizados que necesitas para mejorar la eficiencia, optimizar la colaboración y poner realmente en funcionamiento la información de seguridad.
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
Jamie Barnett from Netskope describes how to enable SaaS while Securing Data. For more information about netskope, see: https://www.wesecure.nl/producten/netskope/
Elastic Security: Enterprise Protection Built on the Elastic StackElasticsearch
Elastic Security provides global data threat prevention, collection, detection, and response. Learn how to outpace the adversaries with multi-layered technology, see live demos, and get answers to all your questions.
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
To watch the full Making Cloud Security Part of Your DNA webinar video, please go to: https://resources.netskope.com/h/i/65967799-making-cloud-security-part-of-your-dna
Summary:
As Chief Security Officer for leading cancer diagnostic company Genomic Health, Craig Guinasso makes cloud a strategic advantage while solving some of today’s most complex security challenges.
Join Craig, along with Sanjay Beri, CEO of Netskope, Missy Krasner, Managing Director of Healthcare at Box, and David Baker, CSO of Okta, for a webinar on the top five strategies that healthcare technology leaders should adopt to get the most out of the cloud while also protecting patient health data and keeping their organizations compliant.
In this powerpoint, you will get a glimpse into the webinar where we discussed how to:
- Think about cloud services in relation to business objectives
- Triage Shadow IT and consolidate on the most enterprise-ready cloud services
- Create checks and policies to identify and prevent PHI leaks
- Turn their business stakeholders into security champions
5 Highest-Impact CASB Use Cases - Office 365Netskope
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.
This presentation covers the top Office 365-specific five CASB use cases that have the highest impact on cloud-consuming enterprises.
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
This discussion will detail best practices and recommendations for using your Application Performance Management / Network Performance Management solutions. The focus is to work in tandem and compliment existing Cyber Security solutions.
Automate threat detections and avoid false positivesElasticsearch
Eliminating blind spots means you now have enough context. But can you get important insights from that context when you need it? Learn how to detect threats — while avoiding the noise of false positives — with the detection engine in Elastic Security. You’ll see how to automate threat detection via correlations and machine learning, with real-world examples of each.
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
AWS, Azure and Google Cloud have disrupted the traditional infrastructure market. After realizing that security is a major roadblock to cloud adoption, they are putting money and effort to built-in security features. But hybrid setups remain a challenge for companies and there is a learning curve for security teams to be proficient on cloud. Find out how to choose the best toolset to secure your data in the cloud.
Elastic Security: Your one-stop OODA loop shopElasticsearch
Elastic Security, leveraging the expertise of the makers of Elasticsearch coupled with the subject matter experts of the security domain, brings enterprise-grade SIEM and response to all users. With Elastic Security and the Elastic Agent, users can search, see, and stop threats, adding the critical “act” step in the OODA loop cycle. Learn how to take control of your environment and see what Elastic Security has in store next.
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
As government agencies expand the use of cloud services, security continues to be a top priority for program managers, policymakers, and cloud service providers (CSPs). Governments and agencies worldwide are moving workloads with varying levels of sensitivity to the cloud. This session will feature agency-level security risk management practices and address common myths about security in the cloud. Participants will gain insight into how governments are leveraging cloud computing to improve their security posture and more quickly benefit from economies of scale.
Mark Ryland, Chief Solutions Architect, Amazon Web Services, WWPS
Problems:
- What Security Products Do We Really Need & Don’t?
- How do we Identify Gaps & Overlaps in Portfolio?
- How do we define our Security Products Strategy?
- What security products can be replaced or dropped?
- How do we understand & categorize security vendors using a standardized approach?
- How do we make the optimal use of my existing cybersecurity products portfolio?
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
This presentation discuss how the Israeli banks should cope with the Israeli central bank cloud regulations. In the slide we examine different articles inside the cloud regulation and discuss the challenges and controls to be used.
Splunk in the Cisco Unified Computing System (UCS) Splunk
Cisco has been a Splunk customer for 8 years, with a strong engineering partnership for 3+ years. Learn how several Cisco customers as well as Cisco IT have deployed, grown, and transformed our businesses using the advantages of Splunk Enterprise software together with Cisco UCS and Nexus hardware. We will also talk about scalability and performance considerations for all scales of data footprint and business growth.
"Running enterprise workloads with sensitive data in AWS is hard and requires an in-depth understanding about software-defined security risks. At re:Invent 2014, Intuit and AWS presented ""Enterprise Cloud Security via DevSecOps"" to help the community understand how to embrace AWS features and a software-defined security model. Since then, we've learned quite a bit more about running sensitive workloads in AWS.
We've evaluated new security features, worked with vendors, and generally explored how to develop security-as-code skills. Come join Intuit and AWS to learn about second-year lessons and see how DevSecOps is evolving. We've built skills in security engineering, compliance operations, security science, and security operations to secure AWS-hosted applications. We will share stories and insights about DevSecOps experiments, and show you how to crawl, walk, and then run into the world of DevSecOps."
This presentation includes cloud security overview, Could Security Access Broker, CASB's four pillars, proxy and API deployment mode and advantage and limitation of deployment modes
Protecting your mission-critical data and applications in the cloud can best be accomplished through a joint effort between your organization and your cloud services provider (CSP).
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
More and more manufacturers have been investing in cloud technology these days, but there is still a contingent of businesses who don’t see the appeal, or are concerned about the risks. In a recent MBT survey about cloud adoption, 50 percent of those manufacturers not using cloud computing said they didn’t because of security concerns. But are these concerns actually justified, or are businesses leaving opportunity on the table due to glaring misconceptions?
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlDavid Etue
Whose cloud is it anyway? Exploring data security, ownership and control as presented at ISSE EU 2014
Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. Cloud security conversations often focus on technical risk from other users of the cloud’s pooled resources, or vulnerabilities in the application and virtualization layers. The more important conversation is likely around data control, ownership, and identity management as the resource pooling and abstraction to address risks from cloud users, cloud administrators, law enforcement, intelligence agencies and a pantheon of adversaries. In all these organizations there is an increase in the latest technologies that could possibly jeopardize security. There are trends with using unsecure cloud services and bring your own devices that often make these organizations vulnerable to risks. In today’s technological world it is not a matter of if the data will be compromised but when it will be compromised and what these groups can do to protect the data when this happens.
This discussion will tackle the complex issues around data ownership and control. If data is destiny, then too many people are in charge of your fate. We discuss how to get it back.
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
Threats are evolving and emerging every day. PagerDuty needed to take a more proactive and efficient stance to monitor, investigate and triage threats and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for PagerDuty to gain end-to-end visibility across their cloud environment. In this webinar, you’ll learn how PagerDuty gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk on AWS.
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
We live in interesting times, at least from computer technology point of view. In the last couple years we change the way our backend systems function (Cloud Computing) and the way consume our front end interfaces (Mobility, the Internet of thing). It is safe to say that the technology changes we are now experiencing – will revolutionize the way we consume technology.
But the described changes are being held back, and mostly because of information security. The root cause of the slow adoption of cloud among enterprises is Trust. Challenges around transparency, compliance, standardization and immature technologies are causing lack of trust between cloud stakeholders. And this lack of trust is the number one obstacle facing cloud computing.
So it is time for innovation. There is great demand for new, innovative solutions that will fuel the engines of the industry. Cloud Computing technologies can be innovative and ground breaking, this has been proved before. Today there are many areas where innovative solution can change the way we think and provide security.
In the presentation we will discuss the future of technologies like Identity Management, Encryption, API security and Big Data platforms and evaluate where we should improve the current technologies.
Regarding encryption - we know that current technologies are limited in our options to safe guard keys in virtual environments and that we don’t have solutions for using encryption as a method to increase real multi tenancy, audit and access controls, for all data types. Encryption technology must improve at all levels, starting from key management, file level encryption (IRM solutions) and other new technologies such as Homomorfic encryptions should be developed further to be effective.
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
The Big Decision – What, when, and why?
Enterprises are aware that the Cloud is changing IT, but security and performance remain a concern. Each cloud model has potential risks: reliability, adaptability, application compatibility, efficiency, scaling, lock- in, security and compliance. Companies must select an enterprise cloud solution to suit a complex mix of applications; these decisions require great care. Uni Systems’ Uni|Cloud was built to be enterprise class. The essential reason that many businesses today are using Uni Systems Cloud for their enterprise IT, is because it offers the only enterprise-class cloud solution in the Greek market, designed for mission-critical applications, coupled with application performance SLAs and security built for the enterprise, combined with cloud efficiency and consumption-based pricing/chargeback.
The rapid growth and many flavors of cloud capabilities can provide great business value. If not well planned, they may also give security professionals fits. With perspective and a deliberate approach, CISOs can not only manage cloud security effectively, but leverage the cloud to power security capabilities.
This session will introduce challenges and trends relating to the cloud for information security practitioners. Much of the session will focus on the speaker's own successes, failures, pitfalls and pratfalls as CISO for a cloud-based startup that built an AWS-based SAAS predictive analytics platform. We will also touch on private cloud concerns, architecture planning and real-world solutions.
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
While security is a top concern in every organization these days, it often gets a bad rap. In many minds, security has the reputation of the bothersome villain who attempts to hinder performance or restrain agility. In this session we will outline three strategies to protect your valuable workloads, without falling into traditional security traps. We will walk through three stories of EC2 security superheroes who saved the day by overcoming compliance and design challenges, using a (not so) secret arsenal of AWS and Trend Micro security tools.
Key takeaways from this session include how to:
- Design a workload-centric security architecture
- Improve visibility of AWS-only or hybrid environments
- Stop patching live instances but still prevent exploits
Speaker: Sasha Pavlovic, Director, Cloud & Datacentre Security, Asia Pacific, Trend Micro
Similar to Simplicity in Hybrid IT Environments – A Security Oxymoron? (20)
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
When you think of Information Technology (IT) and Operational Technology (OT), which side are you on? You may not feel that you fall on any side of that technological skirmish, but when you stop to carefully consider the differences in these two disciplines, it is nearly impossible to avoid a tendentious leaning.
However, the time may be upon us when the conflicts of IT and OT will be put to rest for the broader purpose of making businesses more agile, efficient, resilient and ultimately, more profitable. We spoke with experts in the field who offered their insights about the challenges facing IT and OT convergence. Here’s what they shared!
As online sales surge, retail cybersecurity professionals are taking additional precautions to protect their organizations and their customers’ data. On top of this, the COVID-19 pandemic has driven even more consumers to turn to online shopping. Tripwire worked with Dimensional Research to better understand cybersecurity programs in the retail industry as they prepared for the holiday season.
Download the full report here: https://www.tripwire.com/solutions/solutions-by-industry/retail-and-hospitality/retail-holiday-cybersecurity-survey-report
Tripwire recently examined how organizations are experiencing the cybersecurity impacts of COVID-19 and shifts to working from home. Dimensional Research conducted the survey, which included responses from 345 IT security professionals, in April 2020. Check out some of the key findings from the survey.
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
How can IT and OT teams work together effectively to secure the entire infrastructure? We asked industry experts for their top tips. Read their full responses here: https://www.tripwire.com/state-of-security/ics-security/it-collaborate-ics-security/
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
The skills gap remains one of the biggest challenges for the cybersecurity industry. To gain more perspective on what organizations are experiencing, Tripwire partnered with Dimensional Research to survey 336 security professionals on this issue. For additional key findings, visit: https://www.tripwire.com/state-of-security/security-awareness/security-pros-skills-gap-worsened/
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
Major healthcare providers are tasked with protecting patient data and maintaining complex security compliance requirements enforced through rigorous audits. Mercy Health, a major Midwestern hospital system, became a Tripwire customer in 2013. Using Tripwire technology, they created a successful IT service by integrating their ITSM tool, streamlining their reporting process and more.
Mercy Health and Tripwire show you how to:
-Implement effective change management
-Strengthen security in Epic records systems
-Streamline the audit process
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
Tripwire examined how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as "Cyber Hygiene." The survey, conducted in July in partnership with Dimensional Research, included responses from 306 IT security professionals.
Read the full report here: https://www.tripwire.com/misc/state-of-cyber-hygiene-report-register/?referredby=socialmedia/
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
MITRE is a not-for-profit organization that operates federally-funded research and development centers. Their ATT&CK framework is a useful cybersecurity model illustrating how adversaries behave and explaining the tactics you should use to mitigate risk and improve security. ATT&CK stands for “adversarial tactics, techniques and common knowledge.”
This presentation explores a methodology for pairing proven industry frameworks like MITRE ATT&CK with threat modeling practices to quickly detect and respond to cyber threats. With this approach, industrial organizations can slice their infrastructure into smaller components, making it easier to secure their assets and minimize the attack surface.
Takeaways include how to:
-Make the most out of their threat intelligence feeds
-Report on progress and compliance
-Negotiate trust relationships in the intelligence sharing cycle
-Improve their organization’s overall security posture
Defending Critical Infrastructure Against Cyber AttacksTripwire
In our increasingly connected world, networks of machines help critical infrastructure run more efficiently and prevent downtime. However, systems which were once isolated are now being exposed to digital security threats that operators never considered.
Joseph Blankenship of Forrester Research and Gabe Authier of Tripwire discuss the evolving threat landscape and how we can protect these critical assets from cyber threats.
Topics covered include:
-Examples of some of the most recent cyber-attacks to critical infrastructure
-Why traditional IT security approaches won't work
-Recommended approaches for securing critical infrastructure
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
3. Momentum favors the
cloud
“How would you generally
categorize your organization’s
information security view of
hosted cloud computing
solutions (Hosted Private Cloud,
IaaS, or PaaS) in terms of your
organization’s tolerance for
information security risk?”
3
Source: 451 Research Quarterly Advisory
Report: Budgets and Outlook – Information
Security 2016
4. But legacy /
on-premises
investments aren’t
going anywhere soon
“Approximately how is your
organization’s total information
security spending on vendor-
based security tools currently
distributed across the following
locations?”
4
Source: 451 Research Quarterly Advisory
Report: Budgets and Outlook – Information
Security 2016
5. Why maintain the investment?
• Realizing its full value
• Dependencies
• Maturity
• Of the technology
• Of operations &
expertise
• The cloud is different…
• Regulatory requirements
• Ownership & control
5
9. Hint: What are common objectives?
• Consistency of control,
across both legacy and
“new IT”
• Assurance of enterprise
responsibilities
• Demonstrations of
adherence to enterprise
requirements
9
Security/Compliance Concern Score
Encryption 4.33
Identity Management/Authorization/Access
Control Tools
4.26
Assumption of Liability for Security Breaches or
Outages
4.23
Explicit Contractual Responsibilities for
Security Between the Cloud Provider and
Customer
4.17
Explicit SLAs 4.12
Data Leakage Prevention (DLP) 4.00
Providing Regular Results of Security Audits
from Known Security Testing Companies
3.99
Proven Compliance with Industry Standards 3.92
Auditability 3.91
“Rate the importance of each of the following in addressing
organizational concerns around security and compliance with hosted
cloud solutions:”
Source: 451 Research Quarterly Advisory Report: Budgets and Outlook – Information
Security 2016
10. Finding common ground
• Consistent application of
policy
• Essential for assuring
enterprise compliance
obligations, no matter
where
• Consistent execution of tasks
• Completeness of coverage
across hybrid environments
• Consistent data gathering
• For determining priorities
for the entire investment
10
11. But one size does not fit all
“Most things that we've encountered require a different approach for the
cloud-based solutions, than they do for the on-premises solutions. And
they almost always run into, ‘Oh, yes. But I can't support that’ …
“[For example], ‘we have the best […] security management tool in the
industry,’ ‘Do you support SAP HANA?,’ ‘What's SAP HANA?’…
“Or, ‘We support Amazon Web Services for cloud-based packet inspection.’
‘Does the same system work with my on-premises solution, and put it in
the same console?’ ‘Oh no, you have to have two separate accounts.’
Those are the kinds of conversations that I have all the time…”
-Mid-level management, $1-5bn retailer
11
From recent interviews with enterprise practitioners:
Source: 451 Research Information Security Narratives -: Budgets and Outlook 2016
12. Implementations can be very different
Legacy/on-premises infrastructure
• Accuracy/depth/breadth of asset
discovery
• Across a variety of physical assets
(hosts, networks, applications)
• Balance of speed and accuracy
• Policy constraints
• Tools often purpose-built
Cloud techniques
• API-based - ASK the cloud for
whatever you want to know
• ec2-describe-images --filter
“tag-value=prod”
• DescribeInstances
• DescribeVpnGateways
• DescribeFlowLogs
• Tools must be able to interact
with APIs, automation at scale
12
Example: Asset inventory
How well do your preferred tools
adapt?
16. If you think hybrid IT is diverse today…
16
Centralized Distributed
IoT
17. “Data centers on wheels”
17
• Up to 100 ECUs in some
vehicles1
…or with
arms
…or
wings
…or
legs
1 https://techcrunch.com/2016/08/25/the-biggest-threat-
facing-connected-autonomous-vehicles-is-cybersecurity/
18. Not just “smart” endpoints
• Sophisticated compute near the edge
• Data volume, thin pipes, latency
• Real-time action & response
• Functionality offload for constrained endpoints
18