stackArmor MicroSummit
Creating a SOC/NOC and Security Insights with Splunk and SplunkCloud:
Splunk talk about how to leverage and deploy Splunk ES and the latest SplunkCloud offering to rapidly develop a SIEM and Operational Insights platform quickly. Learn about the latest SplunkCloud offering from Splunk and available on the AWS Marketplace.
stackArmor Security MicroSummit - Next Generation Firewalls for AWSGaurav "GP" Pal
stackArmor Security MicroSummit
How to select a Next Generation Firewall by Palo Alto Networks:
Ed Caswell from Palo Alto Networks will talk about how to select and deploy a next generation firewall. He will cover the topics described below.
Understand key threats and use cases for NGFW : Understand the threat vectors and use cases that are driving NGFW adoption.
Key features and benefits of NGFW : Understand key capabilities and the protections that are delivered for cloud hosting environments.
NGFW Best Practices : Common deployment models and cloud-architecture best practices for security focused organizations leveraging cloud platforms such as AWS.
Using Amazon Inspector to Discover Potential Security Issues - AWS Online Tec...Amazon Web Services
The document provides an overview of the Amazon Inspector security assessment service. It discusses how Amazon Inspector can automate vulnerability assessments for DevSecOps workflows, complementing AWS's shared security model. The session demonstrates how to quickly assess an entire Amazon EC2 fleet using Amazon Inspector, tailor assessments by tuning rules and schedules, and scale assessments using CloudFormation templates.
This document discusses how to implement DevSecOps on AWS for startups. It covers:
- Key principles of DevSecOps like everyone being responsible for security and shifting security left
- The tools and services used in their pipeline including Packer, Terraform, Ansible, SonarQube, AWS Inspector, GuardDuty, and WAF
- How they established policies, used a multi-account approach, implemented access management, and focused on security culture and monitoring
- Their plans to further improve using AWS Config, perform penetration testing, and meet standards like OWASP and PCI DSS
AWS Partner Webcast - Use Your AWS CloudTrail Data and Splunk Software To Imp...Amazon Web Services
With AWS CloudTrail, you can get log files of AWS API calls for your account. CloudTrail enables you to perform security analysis, track resource changes, and aid in compliance reporting.
In this webinar you will learn how CloudTrail collects and stores your AWS log files so that software from AWS Technology Partner Splunk can be used as a Big Data Security Information and Event Management (SIEM) system. You will hear how AWS log files are made available for many security use cases, including incident investigations, security and compliance reporting, and threat detection/alerting. You will also hear from a joint Splunk/AWS customer, FINRA, who will explain how they leverage Splunk in AWS to support their cloud efforts.
What you'll learn:
• Why the machine data from AWS CloudTrail is relevant to security and compliance
• How to visualize data from AWS CloudTrail to monitor and audit security-related activity
• How AWS CloudTrail data can be combined with machine data from other sources in your IT infrastructure, including the OS and apps in your AWS images, for a wide range of operational and security use cases
• How the combination of AWS CloudTrail and Splunk Software improve your uptime, accelerate security and operational investigations, and simplify compliance.
In this session, we review how the combined use of Amazon Web Services native tools, advanced modeling, and machine learning techniques can simplify many of the hardest security problems that are within the customer’s responsibility. Join us as we explore how services like Amazon Virtual Private Cloud flow logs, AWS CloudTrail, and Amazon Inspector combine to enable highly automated, scalable, and comprehensive security for your AWS applications. Learn how to effectively harness the data provided by AWS for security, and understand how Cisco Stealthwatch Cloud and AWS create an integrated, effective security solution.
Strengthening Operations with Splunk and AWS CloudTrailAlan Williams
The document discusses using AWS CloudTrail and Splunk to gain visibility into AWS API calls across multiple AWS accounts. CloudTrail logs API calls and Splunk is used to centrally aggregate those logs. Examples are provided of how this setup could be used for incident response, operations troubleshooting, and compliance auditing. The integration of CloudTrail and Splunk provides scalability and a single view across accounts for security and operations teams.
Autodesk is strengthening its operations with Splunk and AWS by using CloudTrail to log API calls across its AWS accounts and sending the logs to Splunk. This provides Autodesk with a single view of activity across all accounts for security monitoring, compliance auditing, and troubleshooting. Specifically, Autodesk can search logs to investigate incidents, identify compromised hosts, and monitor sign-in locations for security. For compliance, Autodesk can set alerts on sensitive API calls and user creations. Using CloudTrail and Splunk provides Autodesk with a scalable, cost-effective logging solution.
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
This session will demonstrate how to embrace DevSecOps to improve your security and compliance agility and posture within the highly regulated HIPAA environment. We will cover compliance frameworks, data decoupling strategies to fully utilize AWS, and best practices learned from the industry most active cloud adopters.
stackArmor Security MicroSummit - Next Generation Firewalls for AWSGaurav "GP" Pal
stackArmor Security MicroSummit
How to select a Next Generation Firewall by Palo Alto Networks:
Ed Caswell from Palo Alto Networks will talk about how to select and deploy a next generation firewall. He will cover the topics described below.
Understand key threats and use cases for NGFW : Understand the threat vectors and use cases that are driving NGFW adoption.
Key features and benefits of NGFW : Understand key capabilities and the protections that are delivered for cloud hosting environments.
NGFW Best Practices : Common deployment models and cloud-architecture best practices for security focused organizations leveraging cloud platforms such as AWS.
Using Amazon Inspector to Discover Potential Security Issues - AWS Online Tec...Amazon Web Services
The document provides an overview of the Amazon Inspector security assessment service. It discusses how Amazon Inspector can automate vulnerability assessments for DevSecOps workflows, complementing AWS's shared security model. The session demonstrates how to quickly assess an entire Amazon EC2 fleet using Amazon Inspector, tailor assessments by tuning rules and schedules, and scale assessments using CloudFormation templates.
This document discusses how to implement DevSecOps on AWS for startups. It covers:
- Key principles of DevSecOps like everyone being responsible for security and shifting security left
- The tools and services used in their pipeline including Packer, Terraform, Ansible, SonarQube, AWS Inspector, GuardDuty, and WAF
- How they established policies, used a multi-account approach, implemented access management, and focused on security culture and monitoring
- Their plans to further improve using AWS Config, perform penetration testing, and meet standards like OWASP and PCI DSS
AWS Partner Webcast - Use Your AWS CloudTrail Data and Splunk Software To Imp...Amazon Web Services
With AWS CloudTrail, you can get log files of AWS API calls for your account. CloudTrail enables you to perform security analysis, track resource changes, and aid in compliance reporting.
In this webinar you will learn how CloudTrail collects and stores your AWS log files so that software from AWS Technology Partner Splunk can be used as a Big Data Security Information and Event Management (SIEM) system. You will hear how AWS log files are made available for many security use cases, including incident investigations, security and compliance reporting, and threat detection/alerting. You will also hear from a joint Splunk/AWS customer, FINRA, who will explain how they leverage Splunk in AWS to support their cloud efforts.
What you'll learn:
• Why the machine data from AWS CloudTrail is relevant to security and compliance
• How to visualize data from AWS CloudTrail to monitor and audit security-related activity
• How AWS CloudTrail data can be combined with machine data from other sources in your IT infrastructure, including the OS and apps in your AWS images, for a wide range of operational and security use cases
• How the combination of AWS CloudTrail and Splunk Software improve your uptime, accelerate security and operational investigations, and simplify compliance.
In this session, we review how the combined use of Amazon Web Services native tools, advanced modeling, and machine learning techniques can simplify many of the hardest security problems that are within the customer’s responsibility. Join us as we explore how services like Amazon Virtual Private Cloud flow logs, AWS CloudTrail, and Amazon Inspector combine to enable highly automated, scalable, and comprehensive security for your AWS applications. Learn how to effectively harness the data provided by AWS for security, and understand how Cisco Stealthwatch Cloud and AWS create an integrated, effective security solution.
Strengthening Operations with Splunk and AWS CloudTrailAlan Williams
The document discusses using AWS CloudTrail and Splunk to gain visibility into AWS API calls across multiple AWS accounts. CloudTrail logs API calls and Splunk is used to centrally aggregate those logs. Examples are provided of how this setup could be used for incident response, operations troubleshooting, and compliance auditing. The integration of CloudTrail and Splunk provides scalability and a single view across accounts for security and operations teams.
Autodesk is strengthening its operations with Splunk and AWS by using CloudTrail to log API calls across its AWS accounts and sending the logs to Splunk. This provides Autodesk with a single view of activity across all accounts for security monitoring, compliance auditing, and troubleshooting. Specifically, Autodesk can search logs to investigate incidents, identify compromised hosts, and monitor sign-in locations for security. For compliance, Autodesk can set alerts on sensitive API calls and user creations. Using CloudTrail and Splunk provides Autodesk with a scalable, cost-effective logging solution.
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
This session will demonstrate how to embrace DevSecOps to improve your security and compliance agility and posture within the highly regulated HIPAA environment. We will cover compliance frameworks, data decoupling strategies to fully utilize AWS, and best practices learned from the industry most active cloud adopters.
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance.
In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...Amazon Web Services
Learn how cloud.gov can help you deliver on federal government agency missions. cloud.gov is a shared service, built by and for the federal government, designed to help you deploy modern web applications in the cloud with substantially reduced infrastructure and security compliance work. cloud.gov is a self-service, Platform as a Service solution that helps you: (1) easily move existing prototypes to a production-ready environment, with reduced “time to ATO”; (2) transfer existing applications from data centers to make them more scalable and reduce costs; and (3) advance your agency’s use of the cloud by providing a place to prototype in a FedRAMP-authorized environment. cloud.gov developers, 18F, will explain its capabilities, what applications are best suited for cloud.gov, pricing, and more practical details that you need. cloud.gov has a FedRAMP Joint Authorization Board (JAB) P-ATO at the Moderate level, and it leverages the AWS GovCloud FedRAMP JAB P-ATO. This session is for both government agency teams and commercial companies that support the federal government. No technical experience is necessary. Learn More: https://aws.amazon.com/government-education/
by Fritz Kunstler, Sr. Security Consultant, AWS
Put detective controls in place to have visibility into your deployments. In this session, you will learn about deployment visibility at the AWS platform, application, operating system, and network levels, as well as how to build monitoring solutions at scale to leverage AWS services that turn logging data into security insight.
This session is designed to teach security engineers, developers, solutions architects, and other technical security practitioners how to use a DevSecOps approach to design and build robust security controls at cloud-scale. This session walks through the design considerations of operating high-assurance workloads on top of the AWS platform and provides examples of how to automate configuration management and generate audit evidence for your own workloads. We’ll discuss practical examples using real code for automating security tasks, then dive deeper to map the configurations against various industry frameworks. This advanced session showcases how continuous integration and deployment pipelines can accelerate the speed of security teams and improve collaboration with software development teams.
The document summarizes GoPro's migration of their Plus platform from a third-party worker solution to using Amazon ECS. Some key points:
1. They moved all worker services running on Auto Scaling Groups to ECS in under a quarter for improved deployment processes, cost savings, and stability.
2. Using Terraform they defined all infrastructure as code for a more consistent and automated migration.
3. They implemented container tagging, auto-scaling based on queue size and CPU utilization, and container instance draining for smoother deployments.
4. GoPro realized significant cost savings by gaining better utilization compared to keeping minimum instances, improved metrics and monitoring, and developer and operations happiness with the
How Autodesk Leverages Splunk as an Assurance Platform on AWSAlan Williams
In this presentation I talked about how a couple divisions at Autodesk run Splunk on AWS and leverage Splunk as a platform to provide operational and security visibility and confidence for our AWS adoption
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Amazon Web Services
by Daniele Stroppa, Technical Account Manager, AWS
As organizations move their workloads to the cloud, companies must take steps to protect and audit their private and confidential information. This session will focus on Amazon S3 best practices and using AWS Config rules and AWS CloudTrail Data Events to help better protect data residing within S3. The session will include a demonstration of how AWS Config and CloudTrail, in combination with other AWS services, can help with S3 governance and compliance requirements.
by Kristen Haught, Customer Outreach Manager, AWS
Security is the top priority at AWS, and whether you are a startup or an enterprise-level company, our compliance programs can help you demonstrate the effectiveness of this security to your customers. In this session, you will learn how to build your own compliance programs on AWS and how to show your customers evidence of this compliance. Bring both your business and technical hats as we dive into a cross-functional strategy that will accelerate your path to compliance on AWS and your business growth in regulated markets.
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Amazon Web Services
This presentation will include a deep dive into the code behind multiple security automation and remediation functions. This session will consider potential use cases, as well as feature a demonstration of a proposed script, and then walk through the code set to explain the various challenges and solutions of the intended script. All examples of code will be previously unreleased and will feature integration with services such as Trusted Advisor and Macie. All code will be released as OSS after re:Invent.
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Amazon Web Services
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and manage the encryption keys used to encrypt your data. In this session, we will dive deep into best practices learned by implementing AWS KMS at AWS’ largest enterprise clients. We will review the different capabilities described in the AWS Cloud Adoption Framework (CAF) Security Perspective and how to implement these recommendations using AWS KMS. In addition to sharing recommendations, we will also provide examples that will help you protect sensitive information on the AWS Cloud.
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Amazon Web Services
In cloud migrations, the cloud's elastic nature is often touted as a critical capability in delivering on key business initiatives. However, you must account for it in your security and compliance plans or face some real challenges. Always counting on a virtual host to be running, for example, causes issues when that host is rebooted or retired. Managing security and compliance in the cloud is continuous, requiring forethought and automation. Learn how a leading, next generation managed cloud provider uses automation and cloud expertise to manage security and compliance at scale in an ever-changing environment. Through code examples and live demos, we show tools and automation to provide continuous compliance of your cloud infrastructure.
Session sponsored by 2nd Watch
The Future of Securing Access Controls in Information SecurityAmazon Web Services
by Tim Kropp and Greg Frascadore from Bridgewater Associates
Identity Access and Management is a critical information security control used by companies of all shapes and sizes. Tim Kropp and Greg Frascadore from Bridgewater Associates worked with the Automated Reasoning Group (ARG) within AWS to drive innovation in automating, scaling, and future-proofing access controls. Join us to hear how Bridgewater Associates and AWS are leading the future of securing policies through a mathematics based methodology called formal reasoning.
This session, co-led by Steve Schmidt, AWS Chief Information Security Officer, and George Stathakopoulos, Amazon.com VP of Information Security, gives a unique view of how a global provider and customer work together to deliver security on a massive scale. Steve and George will show some of the innovations that help their teams deliver world-class security operations at scale. This session is not moderated but is a conversation between two world-class security experts with differing responsibilities for the Amazon.com and Amazon Web Services global security posture. Join this session and walk away with a deeper understanding of the underlying security innovations powering the cloud and how you can enable them in your business.
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...Amazon Web Services
Many enterprises that follow regulated, process-driven workflows would like to take advantage of the innate features and benefits of AWS to become more agile, achieve operational excellence, and accelerate time-to-market while leveraging a DevOps culture and development methodology. But building a mature DevOps capability doesn’t happen overnight. Creating and implementing testing, compliance, and security automation frameworks requires time and organizational and process changes. Financial institutions are addressing this challenge by using AWS Service Catalog to help bridge the gap between traditional operations and true DevOps.
SID331_Architecting Security and Governance Across a Multi-Account StrategyAmazon Web Services
Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation, separation of duties, and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance. Thomson Reuters shared their journey and their approach to a multi-account strategy. At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
We encourage you attend the full multi-account track:
SID331: Architecting Security and Governance Across a Multi-Account Strategy (Session)
SID335: Implementing Security and Governance Across a Multi-Account Strategy (Chalk Talk)
ENT324: Automating and Auditing Cloud Governance and Compliance in Multi-Account Environments (Session)
SID311: Designing Security and Governance Across a Multi-Account Strategy (Workshop)
SID308: Multi-Account Strategies (Chalk Talk)"
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Amazon Web Services
Learning Objectives:
- Get an inside look into Managed Rules for AWS WAF
- Learn how to set up Managed Rules for AWS WAF and the best practices
- Learn about the security experts that offer Managed Rules for AWS WAF
Securing Your Desktops with Amazon WorkSpaces - AWS Online Tech Talks Amazon Web Services
End-user security is a constant challenge for IT leaders who must balance the business needs of BYOD, distributed workforce, and ready access to business resources, against protecting those same resources from hackers and malware. Amazon WorkSpaces provides a more secure environment over conventional desktop infrastructure because data and applications reside in the cloud, is encrypted during I/O, at rest, and in snapshots, and is not located on end-user devices. In this tech talk we will discuss how you can better secure your IT infrastructure, intellectual property, and sensitive information, and provide recommendations for best practices to help you protect your desktop computing devices using a managed Desktop-as-a-Service (DaaS) solution.
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
The document discusses applying lessons from historical epidemics like cholera to cloud security. It suggests that as scale increases in cloud computing, risks and responses must also change. It recommends avoiding poorly designed architectures, as threats evolve defenses must also evolve, and incidents can spread quickly requiring rapid response. The document outlines several AWS security services and best practices to implement things like access management, detection and response, infrastructure security, and data protection based on lessons from historical epidemics.
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
Learning Objectives:
- Learn how to secure your web applications
- Learn how to configure AWS Shield and AWS WAF
- Learn how to defend the most common Layer 7 attacks
Distributed denial of service (DDoS) and other web attacks can affect your application’s availability, compromise its security, and consume excessive resources. AWS Shield and AWS Web Application Firewall (WAF) help secure your applications from these types of attacks. AWS Shield is a managed DDoS protection service that offers always-on detection and automatic inline mitigation to minimize application downtime and latency. AWS WAF is a web application firewall that helps protect your applications from common web exploits such as SQLi, XSS, and botnets. This introductory tech talk will provide you an overview and demonstration of these services.
The document provides an agenda for the Splunk Discovery event in Brussels on September 5, 2017. It includes presentations on Splunk Overview & Operational Intelligence, Splunk for Security, and Splunk for IT Operations. There will also be networking breaks and breakout sessions on beginners topics, IT operations, and security.
SplunkLive! London 2017 - Splunk Enterprise for IT TroubleshootingSplunk
If you’re just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real-time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We’ll also demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility. Don’t forget to bring your laptop and install Spunk Enterprise before you join us.
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
Security practitioners face new and evolving threats every day. BrightEdge needed to take a more proactive and efficient stance to monitor, investigate and triage threats, and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for BrightEdge to gain visibility across their entire cloud environment to secure critical customer data and ensure compliance.
In this webinar, you’ll hear how BrightEdge gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk.
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...Amazon Web Services
Learn how cloud.gov can help you deliver on federal government agency missions. cloud.gov is a shared service, built by and for the federal government, designed to help you deploy modern web applications in the cloud with substantially reduced infrastructure and security compliance work. cloud.gov is a self-service, Platform as a Service solution that helps you: (1) easily move existing prototypes to a production-ready environment, with reduced “time to ATO”; (2) transfer existing applications from data centers to make them more scalable and reduce costs; and (3) advance your agency’s use of the cloud by providing a place to prototype in a FedRAMP-authorized environment. cloud.gov developers, 18F, will explain its capabilities, what applications are best suited for cloud.gov, pricing, and more practical details that you need. cloud.gov has a FedRAMP Joint Authorization Board (JAB) P-ATO at the Moderate level, and it leverages the AWS GovCloud FedRAMP JAB P-ATO. This session is for both government agency teams and commercial companies that support the federal government. No technical experience is necessary. Learn More: https://aws.amazon.com/government-education/
by Fritz Kunstler, Sr. Security Consultant, AWS
Put detective controls in place to have visibility into your deployments. In this session, you will learn about deployment visibility at the AWS platform, application, operating system, and network levels, as well as how to build monitoring solutions at scale to leverage AWS services that turn logging data into security insight.
This session is designed to teach security engineers, developers, solutions architects, and other technical security practitioners how to use a DevSecOps approach to design and build robust security controls at cloud-scale. This session walks through the design considerations of operating high-assurance workloads on top of the AWS platform and provides examples of how to automate configuration management and generate audit evidence for your own workloads. We’ll discuss practical examples using real code for automating security tasks, then dive deeper to map the configurations against various industry frameworks. This advanced session showcases how continuous integration and deployment pipelines can accelerate the speed of security teams and improve collaboration with software development teams.
The document summarizes GoPro's migration of their Plus platform from a third-party worker solution to using Amazon ECS. Some key points:
1. They moved all worker services running on Auto Scaling Groups to ECS in under a quarter for improved deployment processes, cost savings, and stability.
2. Using Terraform they defined all infrastructure as code for a more consistent and automated migration.
3. They implemented container tagging, auto-scaling based on queue size and CPU utilization, and container instance draining for smoother deployments.
4. GoPro realized significant cost savings by gaining better utilization compared to keeping minimum instances, improved metrics and monitoring, and developer and operations happiness with the
How Autodesk Leverages Splunk as an Assurance Platform on AWSAlan Williams
In this presentation I talked about how a couple divisions at Autodesk run Splunk on AWS and leverage Splunk as a platform to provide operational and security visibility and confidence for our AWS adoption
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Amazon Web Services
by Daniele Stroppa, Technical Account Manager, AWS
As organizations move their workloads to the cloud, companies must take steps to protect and audit their private and confidential information. This session will focus on Amazon S3 best practices and using AWS Config rules and AWS CloudTrail Data Events to help better protect data residing within S3. The session will include a demonstration of how AWS Config and CloudTrail, in combination with other AWS services, can help with S3 governance and compliance requirements.
by Kristen Haught, Customer Outreach Manager, AWS
Security is the top priority at AWS, and whether you are a startup or an enterprise-level company, our compliance programs can help you demonstrate the effectiveness of this security to your customers. In this session, you will learn how to build your own compliance programs on AWS and how to show your customers evidence of this compliance. Bring both your business and technical hats as we dive into a cross-functional strategy that will accelerate your path to compliance on AWS and your business growth in regulated markets.
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Amazon Web Services
This presentation will include a deep dive into the code behind multiple security automation and remediation functions. This session will consider potential use cases, as well as feature a demonstration of a proposed script, and then walk through the code set to explain the various challenges and solutions of the intended script. All examples of code will be previously unreleased and will feature integration with services such as Trusted Advisor and Macie. All code will be released as OSS after re:Invent.
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Amazon Web Services
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and manage the encryption keys used to encrypt your data. In this session, we will dive deep into best practices learned by implementing AWS KMS at AWS’ largest enterprise clients. We will review the different capabilities described in the AWS Cloud Adoption Framework (CAF) Security Perspective and how to implement these recommendations using AWS KMS. In addition to sharing recommendations, we will also provide examples that will help you protect sensitive information on the AWS Cloud.
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Amazon Web Services
In cloud migrations, the cloud's elastic nature is often touted as a critical capability in delivering on key business initiatives. However, you must account for it in your security and compliance plans or face some real challenges. Always counting on a virtual host to be running, for example, causes issues when that host is rebooted or retired. Managing security and compliance in the cloud is continuous, requiring forethought and automation. Learn how a leading, next generation managed cloud provider uses automation and cloud expertise to manage security and compliance at scale in an ever-changing environment. Through code examples and live demos, we show tools and automation to provide continuous compliance of your cloud infrastructure.
Session sponsored by 2nd Watch
The Future of Securing Access Controls in Information SecurityAmazon Web Services
by Tim Kropp and Greg Frascadore from Bridgewater Associates
Identity Access and Management is a critical information security control used by companies of all shapes and sizes. Tim Kropp and Greg Frascadore from Bridgewater Associates worked with the Automated Reasoning Group (ARG) within AWS to drive innovation in automating, scaling, and future-proofing access controls. Join us to hear how Bridgewater Associates and AWS are leading the future of securing policies through a mathematics based methodology called formal reasoning.
This session, co-led by Steve Schmidt, AWS Chief Information Security Officer, and George Stathakopoulos, Amazon.com VP of Information Security, gives a unique view of how a global provider and customer work together to deliver security on a massive scale. Steve and George will show some of the innovations that help their teams deliver world-class security operations at scale. This session is not moderated but is a conversation between two world-class security experts with differing responsibilities for the Amazon.com and Amazon Web Services global security posture. Join this session and walk away with a deeper understanding of the underlying security innovations powering the cloud and how you can enable them in your business.
FSV308-Culture Shift How to Move a Global Financial Services Organization to ...Amazon Web Services
Many enterprises that follow regulated, process-driven workflows would like to take advantage of the innate features and benefits of AWS to become more agile, achieve operational excellence, and accelerate time-to-market while leveraging a DevOps culture and development methodology. But building a mature DevOps capability doesn’t happen overnight. Creating and implementing testing, compliance, and security automation frameworks requires time and organizational and process changes. Financial institutions are addressing this challenge by using AWS Service Catalog to help bridge the gap between traditional operations and true DevOps.
SID331_Architecting Security and Governance Across a Multi-Account StrategyAmazon Web Services
Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation, separation of duties, and billing requirements. In this session, we discuss considerations, limitations, and security patterns when building out a multi-account strategy. We explore topics such as identity federation, cross-account roles, consolidated logging, and account governance. Thomson Reuters shared their journey and their approach to a multi-account strategy. At the end of the session, we present an enterprise-ready, multi-account architecture that you can start leveraging today.
We encourage you attend the full multi-account track:
SID331: Architecting Security and Governance Across a Multi-Account Strategy (Session)
SID335: Implementing Security and Governance Across a Multi-Account Strategy (Chalk Talk)
ENT324: Automating and Auditing Cloud Governance and Compliance in Multi-Account Environments (Session)
SID311: Designing Security and Governance Across a Multi-Account Strategy (Workshop)
SID308: Multi-Account Strategies (Chalk Talk)"
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Amazon Web Services
Learning Objectives:
- Get an inside look into Managed Rules for AWS WAF
- Learn how to set up Managed Rules for AWS WAF and the best practices
- Learn about the security experts that offer Managed Rules for AWS WAF
Securing Your Desktops with Amazon WorkSpaces - AWS Online Tech Talks Amazon Web Services
End-user security is a constant challenge for IT leaders who must balance the business needs of BYOD, distributed workforce, and ready access to business resources, against protecting those same resources from hackers and malware. Amazon WorkSpaces provides a more secure environment over conventional desktop infrastructure because data and applications reside in the cloud, is encrypted during I/O, at rest, and in snapshots, and is not located on end-user devices. In this tech talk we will discuss how you can better secure your IT infrastructure, intellectual property, and sensitive information, and provide recommendations for best practices to help you protect your desktop computing devices using a managed Desktop-as-a-Service (DaaS) solution.
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
The document discusses applying lessons from historical epidemics like cholera to cloud security. It suggests that as scale increases in cloud computing, risks and responses must also change. It recommends avoiding poorly designed architectures, as threats evolve defenses must also evolve, and incidents can spread quickly requiring rapid response. The document outlines several AWS security services and best practices to implement things like access management, detection and response, infrastructure security, and data protection based on lessons from historical epidemics.
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
Learning Objectives:
- Learn how to secure your web applications
- Learn how to configure AWS Shield and AWS WAF
- Learn how to defend the most common Layer 7 attacks
Distributed denial of service (DDoS) and other web attacks can affect your application’s availability, compromise its security, and consume excessive resources. AWS Shield and AWS Web Application Firewall (WAF) help secure your applications from these types of attacks. AWS Shield is a managed DDoS protection service that offers always-on detection and automatic inline mitigation to minimize application downtime and latency. AWS WAF is a web application firewall that helps protect your applications from common web exploits such as SQLi, XSS, and botnets. This introductory tech talk will provide you an overview and demonstration of these services.
The document provides an agenda for the Splunk Discovery event in Brussels on September 5, 2017. It includes presentations on Splunk Overview & Operational Intelligence, Splunk for Security, and Splunk for IT Operations. There will also be networking breaks and breakout sessions on beginners topics, IT operations, and security.
SplunkLive! London 2017 - Splunk Enterprise for IT TroubleshootingSplunk
If you’re just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real-time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We’ll also demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility. Don’t forget to bring your laptop and install Spunk Enterprise before you join us.
SplunkLive! London 2017 - Happy Apps, Happy UsersSplunk
No matter what business you’re in, your web applications are front-and-center for your customers. Downtime, or even bad performance not only creates a spike in costs, they often translate into loss of customers and revenue. You need immediate insight into the availability, performance and usage of your applications and the infrastructure your applications run on. In this session, you will learn why you need to take a platform approach to full stack application management, whether your applications reside on-premises or in the cloud. Second, we will show you how you can use Splunk to monitor the usage and performance of your applications, and quickly troubleshoot faults by stepping through some of the most common issues our customers experience. Third, we’ll contrast what Splunk does relative to other APM tools you may already have deployed, and even show you how you can bring APM data into Splunk to gain more insight into application performance.
Delivering New Visibility and Analytics for IT OperationsSplunk
If you're just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad-hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We'll demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility. You'll have access to a demo environment. So, don't forget to bring your laptop and follow along for a hands-on experience.
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunk
This presentation discusses best practices for data obfuscation in Splunk Enterprise. It covers different techniques for anonymizing and pseudonymizing data at various stages, including at indexing time using transforms, at the application layer, and through event duplication. The presentation also discusses role-based user access controls and ways to secure data in transit and at rest, such as encryption. Various trade-offs of each technique are outlined. Finally, a demo scenario is presented applying encryption with a modular input and anonymization with a SEDCMD to a sample log file.
SplunkLive! London 2017 - DevOps Powered by SplunkSplunk
DevOps is powering the computing environments of tomorrow. When properly configured, the Splunk platform allows us to gain real-time visibility into the velocity, quality, and business impact of DevOps-driven application delivery across all roles, departments, process, and systems. Splunk can be used by DevOps practitioners to provide continuous integration/deployment and the real-time feedback to help the organisation with their operational intelligence. Join us for an exciting talk about Splunk’s current approach to DevOps, and for examples of how Splunk is being used by customers today to transform DevOps initiatives.
Splunk provides a unified data platform that can provide global visibility across multi-cloud environments. It collects and analyzes data from various sources, both on-premise and in public clouds, to help users address challenges like lack of visibility, cost control, cloud sizing and vendor lock-in, consistent security, and unknown future questions. Splunk offers features like apps/add-ons for faster time to value, machine learning tools, and a single platform to monitor all deployments. Case studies show how companies use Splunk to enable cloud migration, cost optimization, and security across hybrid infrastructures.
Splunk provides a unified data platform that can provide global visibility across multi-cloud environments. It collects and analyzes data from various sources, both on-premise and in public clouds, to help users address challenges like lack of visibility, cost control, cloud sizing and vendor lock-in, consistent security, and unknown future questions. Splunk offers features like apps/add-ons for faster time to value, machine learning tools, and a single platform to monitor all deployments. Case studies show how companies use Splunk to enable cloud migration, cost optimization, and security across hybrid infrastructures.
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk
Splunk's Naman Joshi and Jon Harris presented the Splunk Data Onboarding overview at SplunkLive! Sydney. This presentation covers:
1. Splunk Data Collection Architecture 2. Apps and Technology Add-ons
3. Demos / Examples
4. Best Practices
5. Resources and Q&A
Splunk Discovery Indianapolis - October 10, 2017Splunk
This document outlines an agenda for a Splunk Discovery Day event being held in Indianapolis on October 10, 2017. The agenda includes sessions on Machine Data 101, delivering new visibility and analytics for IT operations, and strengthening security posture. It lists Daryl Diebold as the sales manager welcoming over 170 attendees. It also provides information on a sponsor, presentations, lunch, breaks and a happy hour.
Multi-Cloud ist in aller Munde. Das Verbinden von Public und Private Cloud Angeboten bis hin zu SaaS Diensten zu einer Lösung bietet die Möglichkeit, das Beste aus allen Welten in einer gemeinsamen Lösung zu integrieren. Allerdings bringt eine entsprechende Lösung auch höhere Komplexität, die es gilt zu beherrschen. Wie erstellt man eine höhere Transparenz, bessere Kostenkontrolle, bessere Übersichten beim Demand- und Kapazitätsmanagement in heterogenen Cloud Umgebung? Was ist in diesem Kontext Splunk Hybrid Search? Wie kann man Azure, AWS, GCP, Docker Container bis hin zu Salesforce und andere SaaS Dienste unter einen Hut bringen? In 45 Minuten werden wir einen einen Überblick über diese Fragestellungen geben.
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. Join us as we explore the basics of machine data analysis and highlight techniques to help you turn your organization’s machine data into valuable insights. This introductory workshop includes a hands-on(bring your laptop) demonstration of Splunk’s technology and covers use cases both inside and outside IT. Learn why more than 12,000 customers in over 110 countries use Splunk to make business, government, and education more efficient, secure, and profitable.
This document provides an agenda for a Splunk Discovery Day event being held in Milwaukee on September 14, 2017. The agenda includes sessions on Machine Data 101, delivering new visibility and analytics for IT operations, and strengthening security posture. It notes there will be over 100 attendees, 3 sessions, and a happy hour. Breaks and a closing are also included. [/SUMMARY]
Partner Exec Summit 2018 - Frankfurt: Splunk Business Flow BetaSplunk
Splunk is conducting a beta test of its new Business Flow product to provide unified, real-time visibility into complex business processes and customer journeys across different data sources; the beta involves an initial setup session to configure data sources and visualize processes, followed by a follow up session to gather feedback on what is working well and opportunities for improvement; the goal is to help customers gain end-to-end visibility into critical workflows and discover insights to benefit their business and IT operations.
The Hitchhiker's Guide to Service IntelligenceSplunk
Providing transformational impact and insight into key business services while maintaining operational oversight is often difficult in organizations. To effectively communicate business value and alignment organizations must find new methods to bridge the gap between business and operations. This half-day hands-on workshop demonstrates how customers can quickly gain insight into high-value services while aligning business and IT Operations using Splunk’s IT Service Intelligence solution. By leveraging the machine data you are already collecting the exercise provides a transformational method to model high-value services and rapidly build custom visualizations and dashboards. From executive leaders to administrators these personalized service-centric views provide powerful analytics and machine learning to transform service intelligence across your organization.
The Hitchhiker's Guide to Service IntelligenceSplunk
Providing transformational impact and insight into key business services while maintaining operational oversight is often difficult in organizations. To effectively communicate business value and alignment organizations must find new methods to bridge the gap between business and operations. This half-day hands-on workshop demonstrates how customers can quickly gain insight into high-value services while aligning business and IT Operations using Splunk’s IT Service Intelligence solution. By leveraging the machine data you are already collecting the exercise provides a transformational method to model high-value services and rapidly build custom visualizations and dashboards. From executive leaders to administrators these personalized service-centric views provide powerful analytics and machine learning to transform service intelligence across your organization.
Splunk is a powerful platform for understanding your data. This session will provide an overview of machine learning capabilities available across Splunk’s portfolio. We'll dive deeply into Splunk's Machine Learning Toolkit App, which extends Splunk Enterprise with a rich suite of advanced analytics, machine learning algorithms, and rich visualizations. It also provides customers with a guided model-building and operationalization environment. The demonstration will include the guided model-building UI for tasks such as predictive analytics, outlier detection, event clustering, and anomaly detection. We’ll also review typical use cases and real-world customers who are using the Toolkit to drive business results.
Balance agility and governance with #TrueDataOps and The Data CloudKent Graziano
DataOps is the application of DevOps concepts to data. The DataOps Manifesto outlines WHAT that means, similar to how the Agile Manifesto outlines the goals of the Agile Software movement. But, as the demand for data governance has increased, and the demand to do “more with less” and be more agile has put more pressure on data teams, we all need more guidance on HOW to manage all this. Seeing that need, a small group of industry thought leaders and practitioners got together and created the #TrueDataOps philosophy to describe the best way to deliver DataOps by defining the core pillars that must underpin a successful approach. Combining this approach with an agile and governed platform like Snowflake’s Data Cloud allows organizations to indeed balance these seemingly competing goals while still delivering value at scale.
Given in Montreal on 14-Dec-2021
Similar to stackArmor Security MicroSummit - AWS Security with Splunk (20)
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
This document summarizes information presented at a StackArmor security summit. It discusses frameworks such as FISMA, NIST SP 800-37 Risk Management Framework, ISCM, and FedRAMP. It compares FedRAMP to DFARS and explains their differences. It also discusses NIST SP 800-53 and SP 800-171 controls, DoD impact levels, and changes in the latest version of NIST SP 800-53.
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
Providing a FedRAMP or 800-171 compliant solution requires a strong continuous monitoring and management program. DHS' CDM initiative is a robust blueprint for architecting a proven set of policies, procedures and tools that effectively provide the information needed to detect issues and anomalies.
stackArmor MicroSummit
Securing the AWS Environment by McAfee:
Larry Kovalsky will cover topics relevant to securing the AWS hosting environment for compliance and security focused customers. He will cover the topics described below.
Endpoint Focused : McAfee Public Cloud Security Suite – Workload Discovery, Visibility, and Comprehensive Threat Protection for AWS
Network Focused : McAfee Virtual Network Security Platform – Network intrusion prevention featuring advanced signature-less detection techniques and true East/West IPS/prevention capabilities within AWS.
Data Focus : Pervasive Data Protection Suite – Visibility, Encryption, Data Loss Prevention, Web/Cloud Access Service Broker (CASB) protection. Follow the data between on-prem and AWS.
stackArmor MicroSummit - Niksun Network Monitoring - DPIGaurav "GP" Pal
stackArmor Security MicroSummit
Deep Packet Inspection on AWS by Niksun:
Shivank Dua will talk about how Deep Packet Inspection on AWS provides critical capabilities required to detect data breaches, malware and other threat scenarios. The ability to reconstruct the packet stream and perform forensics is critical to speedy incident response protecting from emerging and dynamic threat patterns. Topics will include:
Threat scenarios and the need for Deep Packet Inspection / Deep Content Inspection
Limitations of flow and log-based analysis techniques
Use cases for ‘knowing the unknown’ via deep packet and content inspection
Secured hosting and maintenance of e-commerce websites has become the need of the hour. Modern day websites are highly vulnerable to threats such as hacking, phishing, pharming, denial of access etc. Magento is considered to be one of the most secured e-commerce platform that is easy to install and ready to use. The inbuilt security features of Magento and the additional benefits of AWS makes it the safest and secured platform for modern applications.
Magento is an open source cloud based digital commerce platform that empowers merchants to integrate digital and physical shopping experiences. Magento enterprise edition provides an engaging shopping experience to the users by providing personalized content, fast checkout and a seamless shopper experience. However, in order to ensure the integrity of the user experience and sensitive customer data, it is important to follow security and deployment best practices. stackArmor’s cybersecurity and cloud deployment experts have developed a proven and full-stack methodology to help protect and secure applications and data. The diagram below provides an overview of the key layers and security countermeasures.
AWS offers a wide variety of configuration and deployment choices requiring infrastructure, systems engineering and AWS engineering expertise. The cloud experts at stackArmor, have developed an easy to use deployment automation harness called StackBuilderTM. StackBuilderTM allows users to quickly deploy and use their Magento e-commerce website hosted on AWS. StackBuilder’s intelligent cloud deployment engine takes care of instance selection, AWS VPC configuration and software installation. The fully managed Magento service includes patching, vulnerability management, continuous monitoring, data encryption, and recovery & backup support.
stackArmor StackBuilder provides a rich and easy to use consumer-grade experience for non-technical users to jumpstart their projects by answering a series of simple questions. StackBuilder’s intelligent provisioning and capacity estimation engine leverages the rich set of services provided by the AWS cloud platform including wide variety of EC2 instances, Virtual Private Cloud (VPC), Auto Scaling Groups, Clustering and Elastic Load Balancers (ELB) amongst others. The user of StackBuilderTM does not have to go through the various steps associated with configuring and setting up the AWS infrastructure as they are handled automatically. This allows the user to focus on his project without waiting for costly consultants or the need for cloud infrastructure expertise.
This document discusses deploying and hosting Sitecore, an enterprise content management system, on Amazon Web Services (AWS). It provides an overview of Sitecore and its architecture, as well as recommendations for AWS resources needed for development, test, production, and disaster recovery environments. It also describes StackBuilder, a tool from stackArmor that automates the provisioning of Sitecore environments on AWS through a simple wizard interface.
Secured Hosting of PCI DSS Compliant Web Applications on AWSGaurav "GP" Pal
Protecting card owner information has become very important for e-commerce companies as they have become frequent targets for hackers. In order to safeguard the interests of the card owners, four industry majors, VISA, MasterCard, Discover and American Express, joined hands to create a set of policies and procedures to protect the debit, credit and cash card transactions and to safeguard the personal information of the cardholders. These policies and procedures are collectively known as the Payment Card Industry Data Security Standard (PCI DSS). In simple terms these standards alert companies that they are wholly responsible for the credit card information of their customers. The PCI directs companies to use the information diligently and to store only that information that is required for their business. This white paper provides an overview of architectural features in the AWS cloud that ensure the hosting of e-commerce web applications that are PCI DSS compliant. This stackArmor white paper provides an overview of hosting PCI DSS compliant applications in AWS.
Implementing Secure DevOps on Public Cloud PlatformsGaurav "GP" Pal
Businesses are looking to accelerate the delivery of production quality software with fewer defects, and better security. Continuous Integration/Continuous Deployment (CI/CD) also known as DevOps is a rapidly maturing practice for reducing the time and effort it takes to test and deploy code into production. The rapid automation of the integration and deployment activities is common especially on cloud-based platforms. Adding security testing into the DevOps pipeline can help address the needs of regulated, compliance and public sector focused organizations. This white paper describes the use of open source technologies and commercial packages to design and deploy a Secure DevOps pipeline. Tools such as Yasca, SonarQube, and OpenSCAP amongst others when integrated with vulnerability scanners such as Tenable Nessus, HP Fortify and others provide a robust SecDevOps implementation. This white paper by stackArmor provides an overview on how an organization can implement a Secure DevOps pipeline and its key elements.
FGMC - Managed Data Platform - CloudDC MeetupGaurav "GP" Pal
First Guaranty Mortgage Corporation (FGMC) is a full service national lender offering mortgage solutions to clients. The Enterprise Data team is focused on leveraging Enterprise Data as a differentiator. By embracing data science, analytics and cloud technologies, new and innovative solutions are delivered to support the business mission.
The rapid evaluation and deployment of a flexible, scalable, and secure cloud-based data platform was critical to jumpstarting enterprise data initiatives.
FGMC leveraged Amazon Web Services (AWS) and conducted a agile and iterative transformation process that included a pilot using stackArmor's StackBuilder solution for rapidly deploying services.
The document discusses stackArmor's presentation on using MongoDB and Solr on AWS for a customer's ETL processing needs. The customer receives large amounts of data monthly and needed to process it faster at lower cost. StackArmor designed a solution using MongoDB shards, SolrCloud, and Chef automation to meet the customer's goals of processing 5 million records per hour within budget and compliance requirements. Through tuning the design over time, they were able to improve throughput to over 3 million records per hour sustained.
The document discusses AWS security best practices and common mistakes made when using AWS. It provides examples of real security incidents that occurred due to misconfigurations or lack of security controls. The presentation covers topics like identity and access management, network access control, logging and monitoring, compliance frameworks, and security tools that can be used to harden AWS environments. It also describes advanced VPC networking techniques and the DoD security technical implementation guide (STIG) compliance process.
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefGaurav "GP" Pal
Large scale data processing for Extract Transform and Loading (ETL) jobs is a very common practice. The stackArmor DevOps team developed a Chef based automation solution to automate the AWS environment provisioning, code deployment and data ingestion processing to ingest and process over 2 TB of Data.
This presentation covers the technologies used, the planning phase, AWS instance selection and optimizing the ETL processing for not only performance but also cost.
The target was to process 500 million rows within 72 hours with a processing rate of 5 million transactions per hour.
The presentation also provides pitfalls and automation optimizations performed to accomplish the targeted processing rates.
The presentation was delivered at the DevOpsDC Meetup on May 17, 2016
Gaurav Pal gave a presentation on enabling better decision making and data transparency with Tableau dashboards hosted on AWS. The presentation covered how to jumpstart dashboard and visualization initiatives using Tableau and AWS, licensing and hosting options for Tableau on AWS, and demoed StackBuilder which can help users quickly select and estimate costs for hosting Tableau on AWS. The presentation provided an overview of using Tableau for data visualization, licensing models, hosting on AWS Marketplace or using StackBuilder for an automated deployment, and concluded with a demo and contact information.
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
As more SaaS businesses come online it is critical they follow security architecture and operational best practices. The changing regulatory framework from agencies such as SEC, FTC and other agencies requires SaaS companies to implement security best practices.
Big Data - Accountability Solutions for Public Sector ProgramsGaurav "GP" Pal
Enhancing Program Oversight and Integrity through Agile Systems Development and Advanced Analytics requires the application of advanced algorithms and technologies for proactive oversight.
The Recovery Operations Center (ROC) deployed advanced analytics and data analytics staff to help identity and prevent waste, fraud and abuse in the $840 billion ARRA 2009 program.
2013 11-06 adopting aws at scale - lessons from the trenchesGaurav "GP" Pal
Enterprise adoption of elastic cloud computing platforms such as AWS require new management and operations processes.
Highlights:
--“Pay-as-you-go” is an asset only if strong governance is in place
--Who should be performing this optimization? Developers? Ops? PM’s? What should be the frequency?
--What is the playbook?
----Resizing instances based on demand
----Reviewing storage consumption
----Standard/Reserved Instances
--Shut-down instances when not needed
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroGaurav "GP" Pal
DevOps helps accelerate the delivery of software applications through automation and by removing Development & Operations silos. The Netflix Platform Engineering team has developed a robust data pipeline solution called SURO that has been open sourced. Come learn from the experiences of pioneers like Netflix how they are leveraging the data pipeline for new and innovative use cases. This is the presentation by Danny Yuan, Netflix Platform Engineering Team on operational and monitoring aspects of applications on cloud platforms.
Enterprise transformation with cloud computing Jan 2014Gaurav "GP" Pal
We concluded on Jan 31, 2014 another fabulous edition of the Digital Innovation Breakfast. Over 60 people registered and listened to the keynote address by Mr. Bernie Mazer, CIO, US Department of the Interior. This was followed by a lively panel discussion that included US Department of the Interior, US Department of the Treasury, Accenture, Microsoft and Gartner. We are now set to execute on the third edition of the event scheduled for late April 2014/early May 2014 titled “Big Data in Financial Services”.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlike traditional structured data or multi-dimensional data– for example data stored in a traditional relational database for batch reporting – machine data is non-standard, highly diverse, dynamic and high volume. You will notice that machine data events are also typically time-stamped – it is time-series data.
Take the example of purchasing a product on your tablet or smartphone: the purchase transaction fails, you call the call center and then tweet about your experience. All these events are captured - as they occur - in the machine data generated by the different systems supporting these different interactions.
Each of the underlying systems can generate millions of machine data events daily. Here we see small excerpts from just some of them.
When we look more closely at the data we see that it contains valuable information – citizen id, case id, time waiting on hold, twitter id … what was tweeted.
What’s important is first of all the ability to actually see across all these disparate data sources, but then to correlate related events across disparate sources, to deliver meaningful insight.
If you can correlate and visualize related events across these disparate sources, you can build a picture of activity, behavior and experience. And what if you can do all of this in real-time? You can respond more quickly to events that matter.
For example, if an organizations captured the customers twitter ID in their customer profile this correlation would be possible. Where that didn’t exist, they could at least group by demographic with the tweets.
You can extrapolate this example to a wide range of use cases – security and fraud, transaction monitoring and analysis, web analytics, IT operations and so on.
Splunk has several applications and partnerships that make us especially relevant for the Internet of Things:
Community apps such as modular inputs for REST Endpoints, Kinesis, Kafka, and JMS Messaging Services allow easy connection to and ingestion of the high velocity and volume data available from the web services and from web based messaging queues that are becoming so common in IoT data delivery. Splunk’s DB Connect allows connection to data stored in relational databases, as well as to traditional structured metadata sources which can be used for Splunk lookups. And for the makers in the house, a community supported Splunk Universal Forwarder for ARM architectures runs on platforms like Raspberry Pi for easy access to the data and applications running on those IoT devices.
Strong partnerships with companies well established in the internet of things, including Kepware, CQCloud and DataFlare for industrial data collection, analytics and visualization, and ThingWorx and MachineShop for IoT platforms integration in the Enterprise.
Splunk is a Security Intelligence Platform and we can address a number of security use cases. We’re more flexible than a SIEM and can be used for non-security use cases. Splunk software can complement or replace existing SIEM deployments, while also addressing more complex security use cases, such as supporting fraud detection and finding insider threats.
The Spunk Security Intelligence Platforms consists of multiple components. Foundational to the platform is Splunk Enterprise, our core product. Every Splunk deployment includes this for indexing and storage. Using this alone, customers can perform searches and easily build reports/dashboards from their data. A variety of applications can be installed on top of the Splunk Enterprise, ranging from 3rd party vendor apps, community developed apps and Splunk Apps. You can build apps on top for your use or to share within your company. Apps are a collection of reports, dashboards, and searches purpose-built for a specific use.
Our premium security app is the Splunk Enterprise Security. It provides out-of-the-box security workflow, dashboards, reports, correlation rules that bring together security and infrastructure technologies across your company. Any of the apps can be mixed-and-matched to achieve the desired level of functionality.
~2:00 minutes
Enumerate AWS specific offerings and solutions. Briefly describe each one:
Splunk cloud – SaaS application built on AWS, 100% uptime SLA and it’s SOC 2 certified
Splunk paid AMI coming in July , currently you can get a BYOL in marketplace AMI.
Splunk Light, starts at 90$/month for 1GB per day
Enterprise Security: This is positioned as a “premium service”
ITSI:
Splunk App for AWS:
Cloudwatch provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
Customers use Cloudwatch to monitor EC2 instances, EBS volumes, ELBs, RDS, VPC Flow logs, and other metrics
Cloudwatch functions through AWS API’s which are available through the AWS SDK
Cloudwatch enables the monitoring of Ec2 instances as well as other AWS resources (Monitor metrics on Amazon DynamoDB tables, Amazon EBS volumes, Amazon RDS DB instances, Amazon Elastic MapReduce job flows, Elastic Load Balancers, Amazon SQS queues, Amazon SNS topics, and more for no additional charge. No additional software needs to be installed.)
Custom metrics can be generated for custom applications via a simple API request which are then monitored by Cloudwatch. Alarms can be set when certain thresholds are met, and users can be either be notified of these alerts, or have AWS react dynamically with auto scaling the infrastructure.
Cloudwatch provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
Customers use Cloudwatch to monitor EC2 instances, EBS volumes, ELBs, RDS, VPC Flow logs, and other metrics
Cloudwatch functions through AWS API’s which are available through the AWS SDK
Cloudwatch enables the monitoring of Ec2 instances as well as other AWS resources (Monitor metrics on Amazon DynamoDB tables, Amazon EBS volumes, Amazon RDS DB instances, Amazon Elastic MapReduce job flows, Elastic Load Balancers, Amazon SQS queues, Amazon SNS topics, and more for no additional charge. No additional software needs to be installed.)
Custom metrics can be generated for custom applications via a simple API request which are then monitored by Cloudwatch. Alarms can be set when certain thresholds are met, and users can be either be notified of these alerts, or have AWS react dynamically with auto scaling the infrastructure.
AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you.
The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service.
The AWS API call history produced by CloudTrail enables security analysis, resource change tracking, and compliance auditing.
With CloudTrail, you can get a history of AWS API calls for your account, including API calls made via the AWS Management Console, AWS SDKs, command line tools, and higher-level AWS services (such as AWS CloudFormation).
AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. Config Rules enables you to create rules that automatically check the configuration of AWS resources recorded by AWS Config.
Common use cases:
Discovery
Change Management
Audit and Compliance
Troubleshooting
Security and Incident Analysis
With AWS Config, you can discover existing and deleted AWS resources, determine your overall compliance against rules, and dive into configuration details of a resource at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting.
The live expression of our community is our users conference. Journalists last year said it was more like a family reunion than a technology conference, and we take that as a compliment. It’s the best place to share best practices, new ideas and learn directly from the smartest people in the Splunk ecosystem. Doesn’t matter if you’re just getting started with Splunk or are a veteran user, everyone learns something and gets reenergized at .conf2017.
4 inspired Keynotes
165+ Breakout sessions addressing all areas and levels of Operational Intelligence – IT, Business Analytics, Mobile, Cloud, IoT, Security… and MORE!
30+ hours of invaluable networking time with industry thought leaders, technologists, and other Splunk Ninjas and Champions waiting to share their business wins with you!
Join the 50%+ of Fortune 100 companies who attended .conf2016 to get hands-on with Splunk. You’ll be surrounded by thousands of other like-minded individuals who are ready to share exciting and cutting edge use cases and best practices. You can also deep dive on all things Splunk products together with your favorite Splunkers.
Head back to your company with both practical and inspired new uses for Splunk, ready to unlock the unimaginable power of your data! Arrive in DC a Splunk user, leave Orlando a Splunk Ninja!
REGISTRATION IS OPEN, sessions will be posted by end of June