Best practices for securing IPv4 and IPv6 connectivity. Presented by Scott Hogg, GTRI, and Jay Wiley, IRS, at the Digital Government Institute's Government IPv6 & Networking Conference & Expo, August 2013.
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
Security Operations & MITRE ATT&CK
Description: A two topic talk covering the core functions of the blue team (security operations), common roles and the required skills to be successful. Then an overview of the threat-led knowledgebase MITRE ATT&CK and how to put it to good use for threat detection and response.
Security operations centres are made up of several roles and each role benefits from a person with specific skills and competencies. This presentation was presented at Napier University on the 13/11/2019 at their 'Cyber Breakfast'.
Simplicity in Hybrid IT Environments – A Security Oxymoron?Tripwire
Most businesses operate on cloud-based and on-premises servers. This hybrid environment allows for easy access to important data but often creates complexity in properly managing and securing your assets. Now consider IoT devices on your network, and this hybrid environment becomes nearly impossible to maintain.
Scott Crawford, Research Director at 451 Research, and David Meltzer, Chief Technology Officer at Tripwire, discuss how to simplify modern network complexities with essential security controls.
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
Sesja o doświadczeniach profesjonalnego zespołu SOC (Security Operations Center) w oparciu o przykłady z życia wzięte. Od anatomii ataków do rekomendacji jak można się skutecznie bronić.
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
Security Operations & MITRE ATT&CK
Description: A two topic talk covering the core functions of the blue team (security operations), common roles and the required skills to be successful. Then an overview of the threat-led knowledgebase MITRE ATT&CK and how to put it to good use for threat detection and response.
Security operations centres are made up of several roles and each role benefits from a person with specific skills and competencies. This presentation was presented at Napier University on the 13/11/2019 at their 'Cyber Breakfast'.
Simplicity in Hybrid IT Environments – A Security Oxymoron?Tripwire
Most businesses operate on cloud-based and on-premises servers. This hybrid environment allows for easy access to important data but often creates complexity in properly managing and securing your assets. Now consider IoT devices on your network, and this hybrid environment becomes nearly impossible to maintain.
Scott Crawford, Research Director at 451 Research, and David Meltzer, Chief Technology Officer at Tripwire, discuss how to simplify modern network complexities with essential security controls.
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
Sesja o doświadczeniach profesjonalnego zespołu SOC (Security Operations Center) w oparciu o przykłady z życia wzięte. Od anatomii ataków do rekomendacji jak można się skutecznie bronić.
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
In this presentation, we use the pets vs. cattle analogy to discuss migrating to the cloud, including some challenges you may encounter with security and compliance, and considerations when selecting foundational controls.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
If you are IT Operations or CISO, you should heard about Insider Threat and you should have covered already this risk in your organization ... haven't you ? Maybe we can help ... have a look at this presentation.
TWISummit 2019 - Return of Reconfigurable ComputingThoughtworks
Custom-hardware development is known for its challenges related to development costs, pace of execution and manufacturing issues. This is where reconfigurable computing (also known as Field Programmable Gate Arrays or FPGAs) steps in for the rescue. What are its implications for the software development industry?
The Definitive CASB Business Case Kit - PresentationNetskope
As #1 on Gartner’s information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes:
- The Gartner Market Guide to Cloud Access Security Brokers
- A CASB justification letter that you can tailor and deliver to your decision-maker
- A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation
- A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB
- The Netskope Cloud Report, which contains the latest cloud security benchmarks
- The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. In this session, you will learn practical strategies in using threat modeling in secure software design and how to apply risk management in dealing with the threats.
NetskopeTM is the leader in cloud app analytics and policy enforce- ment. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps.
Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
Herding Pets and Cattle: Extending Foundational Controls Into the CloudTripwire
In this presentation, we use the pets vs. cattle analogy to discuss migrating to the cloud, including some challenges you may encounter with security and compliance, and considerations when selecting foundational controls.
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
Feel free to contact us for more information.
If you are reusing some of the slides or their content, can you please reference our website as the source: https://www.elysiumsecurity.com
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
If you are IT Operations or CISO, you should heard about Insider Threat and you should have covered already this risk in your organization ... haven't you ? Maybe we can help ... have a look at this presentation.
TWISummit 2019 - Return of Reconfigurable ComputingThoughtworks
Custom-hardware development is known for its challenges related to development costs, pace of execution and manufacturing issues. This is where reconfigurable computing (also known as Field Programmable Gate Arrays or FPGAs) steps in for the rescue. What are its implications for the software development industry?
The Definitive CASB Business Case Kit - PresentationNetskope
As #1 on Gartner’s information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes:
- The Gartner Market Guide to Cloud Access Security Brokers
- A CASB justification letter that you can tailor and deliver to your decision-maker
- A CASB ROI calculator into which you can enter your assumptions, plus a 3-slide companion executive presentation
- A sample Cloud Risk Assessment so you know what to expect when you request this analysis from your CASB
- The Netskope Cloud Report, which contains the latest cloud security benchmarks
- The 15 Most Critical CASB Use Cases eBook, which will help you understand and prioritize your CASB use cases
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. In this session, you will learn practical strategies in using threat modeling in secure software design and how to apply risk management in dealing with the threats.
NetskopeTM is the leader in cloud app analytics and policy enforce- ment. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps.
Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
Using Big Data to Counteract Advanced ThreatsZivaro Inc
"Good Guys versus Bad Guys: Using Big Data to Counteract Advanced Threats" was presented with permission at the Rocky Mountain Information Security Conference (RMISC) in May 2014 by Kelly Feagans (Splunk) and Dave Herrald (GTRI).
Most organizations collect heaps of machine-generated operational data, but making sense of it and understanding what role it can play in a security program can be overwhelming. This session will help you understand how Splunk can take data from a variety of sources and transform it into meaningful information that you can use to yield greater visibility into your security posture, identify unknown threats and streamline security operations.
GTRI's CTO, Scott Hogg, presented at NANOG (North American Network Operators Group) on the topic of deploying IPv6, including pitfalls to be aware of, addressing challenges, routing, dual-protocol applications, troubleshooting and training.
Presented by Scott Hogg, CTO GTRI, at NANOG On The Road 5, Orlando, FL, February 24, 2015.
As with any new technology, IPv6 requires a learning curve for network managers and IT administration and operations personnel. This presentation covers many of the current best practices for approaching and progressing with an IPv6 deployment.
Support Software Defined Networking with Dynamic Network ArchitectureZivaro Inc
You know the value of SDN, but do you know what architecture best supports an SDN system? This presentation explains the importance of best in-class virtualized networking solutions and how those tools integrate with leading SDN systems. You’ll learn how SDN architecture components, such as Citrix Netscaler, help to converge the management of network and application services into a centralized, extensible orchestration platform. You'll also discover how to automate provisioning and configuration of the entire infrastructure to deliver new applications and services in minutes. This presentation is from a webinar presented by Michael Edwards, Principal Architect GTRI, and Jacob Rutski, Citrix, on May 12, 2016.
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
An overview of Splunk Enterprise 6.3. Presented by Splunk's Jim Viegas at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
GTRI and Cisco discuss how using the internet to run branch network traffic provides a better user experience and reduces costs. You’ll learn the basics of Software-Defined WAN (SD-WAN) and the benefits, including:
- Reduced costs
- Reliability and security
- Flexibility to choose service providers
- Optimized traffic flows
Presented by Mani Ganesan of Cisco and Michael Edwards of GTRI (http://www.gtri.com) in a webinar on August 10, 2016. Webinar recording at https://youtu.be/08_QpBT07pU.
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
An overview of GTRI's system integrator practice, with a focus on Splunk. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
Petit Déj' "Ergonomie et SEO" organisé par Use Age le 26 Septembre 2013Use Age
Petit Déj' Ergonomie et SEO organisé par Use Age le 26 Septembre 2013 à Sophia Antipolis : "Ergonomie et SEO - Quand Google lui-même soutient l'utilisabilité". Présentation de Carole Chagniat, coordinatrice SEO - Introduction par Catherine Bellino, ergonome et présidente de Use Age.
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
Use cases of GTRI clients who use Splunk Enterprise. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
Big Data Workshop: Splunk and Dell EMC...Better TogetherZivaro Inc
Discover the power of big data analytics and how to effectively make machine data accessible, usable and valuable to your organization. Topics include Splunk Enterprise 6.5 and how to choose the right storage solution for Splunk. This Big Data Workshop was presented by GTRI and Dell EMC on October 27, 2016. For more information, visit http://www.gtri.com/.
Organizational Change Management (OCM) is a strategic framework on how to manage change. Discover the challenges companies experience during business transformations and get tips and advice for how to successfully execute an initiative. Learn how to effectively drive change within your organization and how changes in technologies, structure, processes and culture should be managed and prepared for ahead of a major transformation initiative. Presented during a GTRI webinar on October 13, 2016.
While IPv6 has been a defined standard since 1998, the end-user adoption of this standard is minimal. Less than 1% of Internet peers utilize IPv6 in the course of normal operation. However, IPv6 support within operating systems and network routers is becoming commonplace. While IT personnel continue to be focused on IPv4, IPv6 capabilities may already be active by default on many Internet connected systems within an IT professional's environment. These IPv6 interfaces generate traffic which can bypass traditional controls based on IPv4 technology. Although IPv6 is likely to eclipse IPv4 as the dominant Internet protocol, the path to this state is disorganized and unclear. This state indicates that as IPv6 gains inertia as a legitimate Internet protocol, IT administrators need to be aware of and manage IPv6 traffic on their network with as much vigilance as they would apply to the more commonplace IPv4.
Kevin D. Wilkins, CISSP, Senior Network Engineer, iSecure LLC
After coursework at the Rochester Institute of Technology, Kevin’s professional experience includes ISP and VOIP operations. Kevin has 10 years of industry experience in system and network engineering and platform management. In the last few years, a focus on information security has brought his experiences together into a consolidated viewpoint of enterprise-wide security policy and implementation.
Peter Rounds, Senior Network Engineer, Syracuse University
Peter has been a Sr. Network Engineer at Syracuse University for 11 years. He is responsible for maintaining core network infrastructure consisting of Internet edge traffic identification/management, Internet BGP routing and security profile management, campus OSPF and security profile management, and data center network and security profile management. He is responsible for numerous security technologies for the University.
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsOlivier DASINI
MySQL Enterprise Transparent Data Encryption (TDE) protects your critical data by enabling data-at-rest encryption in the database. It protects the privacy of your information, prevents data breaches and helps meet regulatory requirements including the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and numerous others.
MySQL Enterprise Audit provides an easy to use, policy-based auditing solution that helps organizations implement stronger security controls and satisfy regulatory compliance.
As more sensitive data is collected, stored and used online, database auditing becomes an essential component of any security strategy. To guard against the misuse of information, popular compliance regulations including HIPAA, Sarbanes-Oxley, and the PCI Data Security Standard require organizations to track access to information.
MySQL Enterprise Firewall guards against cyber security threats by providing real-time protection against database specific attacks. Any application that has user-supplied input, such as login and personal information fields is at risk. Database attacks don't just come from applications. Data breaches can come from many sources including SQL virus attacks or from employee misuse. Successful attacks can quickly steal millions of customer records containing personal information, credit card, financial, healthcare or other valuable data.
MySQL Enterprise Masking and De-identification provides an easy to use, built-in database solution to help organizations protect sensitive data from unauthorized uses by hiding and replacing real values with substitutes.
MySQL Enterprise Edition provides ready to use external authentication modules to easily integrate existing security infrastructures, including Linux Pluggable Authentication Modules (PAM) and Windows Active Directory.
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicSnapLogic
Last week SnapLogic sponsored partner event Splunk Worldwide Users' Conference in Las Vegas. The theme of the conference was "Your Data, No Limits." In keeping with this theme, SnapLogic helps Splunk customers access more comprehensive analytics by integrating as much data as possible from as many sources as possible, and by streamlining the business process of loading data in Splunk, detecting problems, and facilitating actions that result in a prompt resolution.
To learn more, visit: http://www.snaplogic.com/.
Overview and introductory remarks for the OGF sessions held May 21-22, 2015 co-located with the European Grid Initiative 2015 conference that took place the week of May 18-22, 2015 in Lisbon, Portugal. For details, see https://www.ogf.org/ogf/doku.php/events/ogf-44
Learn how HP Fortify On Demand is leveraging Fortify Runtime Protection to protect our own cloud services. See tips and techniques learned from deploying Runtime Protection in the real world, and learn how you can leverage the same technology in your environment without compromising performance or uptime. You’ll come away with tips on deploying, managing, and integrating Fortify Runtime Protection so you can block attacks while providing your developers with line-of-code detail regarding how to close the holes.
Cisco has developed a comprehensive approach, the Mass Scale Networking (MSN) Transformation Journey, that covers both aspects. On the technology front, technologies such as Segment Routing, EVPN, orchestration, automation, HW/SW disaggregation are covered. On the operating model side, the use of advanced APIs, model driven operations, Infrastructure as Code (IaC), and others are also covered. The primary objective of this session being to create a methodical and structured approach to drive an SP’s MSN Journey.
World of many (OpenStack) clouds - the Making of the IntercloudLew Tucker
Cloud’s today are islands. In the days before the internet, so were the different networks. What can we learn from how competing companies, with open protocols, the IETF, and RFC's created what we now know as the internet? As an open source community, is OpenStack where we start to envision an "InterCloud"?
Information security is not about reacting to attacks. Information security is about analyzing patterns and predicting potential threats by expanding the defense perimeter beyond the traditional borders.
Introduction to the Open Grid Forum community and the document production process, as well as several primary application arenas for OGF specifications, given at the co-located International Conference on Cloud and Autonomic Computing (CAC 2014), IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2014) and the IEEE International Conference on Peer-to-Peer Computing (P2P’14) conferences, September 8-12, 2014 at Imperial College in London, UK.
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...Cartegraph
Cisco Services is providing a behind-the-scenes perspective of its decision management and smart analytics programs. Success for Cisco is more than the technology or any one project. It's a mix of art, philosophy and technology that allows analytics to keep adding value to the business. You will hear how the program has evolved over the last 6 years and will explore different levels of smart analytics. Along the way, you will hear how the team grew a simple idea into a patent-pending resource allocation model.
For more information on the Loras College 2014 Business Analytics Symposium, the Loras College MBA in Business Analytics or the Loras College Business Analytics Certificate visit www.loras.edu/mba or www.loras.edu/bigdata.
Business applications like ERP, CRM, SRM, and others are one of the major topics in the field of computer security as these applications store business data and any vulnerabilities in these applications can cause a significant monetary and reputational loss or even stoppage of business.
Nonetheless, people still do not pay much attention to the technical side of SAP security.
As for SAP, we saw different vulnerabilities at all levels (architecture, software vulnerabilities and implementation).
IT investments, by their nature, must be adjusted over time to fit ever-changing business requirements. If you’ve been tasked with ‘right-sizing’ your Citrix environment – or want to show value by getting ahead of that request – join Craig Jeske, Director of Engineering at GTRI, for a rundown of Citrix optimization techniques and tasks.
The interactive discussion will cover topics including:
- Auditing and assessment frameworks
- Use case development
- Security and access concerns & controls
- Hosting strategies
- User experience & feedback
View the webinar here:
https://youtu.be/SV9N-6bwbSY
On-Prem vs. Cloud Collaboration ShowdownZivaro Inc
When it comes to collaboration deployments, many organizations struggle to decide between on-premise or cloud deployments. It’s critical to understand the benefits and drawbacks of each option before moving forward.
This webinar from Global Technology Resources, Inc. (GTRI) and Cisco includes collaboration considerations such as:
- Costs, including CapEx vs. OpEx considerations and TCO
- Resources, including outsourced on in-house expertise
- Migration strategies and risk assessments
- Disaster recovery
View the webinar here: https://youtu.be/QA8R39rDc7Y
Insider threats come in a variety of forms and may be malicious or simply the result of negligence. Insider attacks can cause more damage than outsider threats, so it is important that organizations understand how to protect against and remedy insider threats. Learn more about insider threats and GTRI's Insider Threat Security Solution in this presentation. (Source: GTRI)
This presentation includes information about Cisco Stealthwatch, which goes beyond conventional threat detection and harnesses the power of NetFlow. With it, you get advanced network visibility, analytics, and protection. You see everything happening across your network and data center. And you can uncover attacks that bypass the perimeter and infiltrate your internal environment. (Source: Cisco)
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
Many companies have discovered that there is “gold” in their server log files and machine data. Closely monitoring this data can improve security, help prevent costly outages and reduce the time it takes to recover from a problem. In this presentation, GTRI’s Micah Montgomery explains how operational intelligence can be gained from machine data, and how Splunk Enterprise can turn this data into actionable insights. Also presenting was NetApp’s Steve Fritzinger, who discussed how to manage the challenges of capturing and storing a flood of data without breaking the bank.
Presented at "Denver Big Data Analytics Day" on May 18, 2016 at GTRI.
Cisco ACI: A New Approach to Software Defined NetworkingZivaro Inc
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Webinar can be found here: https://youtu.be/WFY3kUwTAw4
Have questions? Contact GTRI, 1.877.603.1984.
Splunk Fundamentals provides a basic understanding of the components in a Splunk implementation and how they scale. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
GTRI is Splunk's first ELITE partner in the USA. We offer license resale, design, installation, architecture and support of Core Splunk and Applications for Federal and Commercial accounts.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.