This session was presented at Global Microsoft 365 Developer Bootcamp, 2020, Hyderabad, India on 17 October, 2020.
Agenda:
- Manage User Identity
- Role Based Access Control (RBAC)
- Principle of least privilege
- Privileged Identity Management (PIM)
- Real world use cases
Sensitive customer data needs to be protected throughout AWS. This session discusses the options available for encrypting data at rest in AWS. It focuses on several scenarios, including transparent AWS management of encryption keys on behalf of the customer to provide automated server-side encryption and customer key management using partner solutions or AWS CloudHSM. This session is helpful for anyone interested in protecting data stored in AWS.
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Amazon Web Services
As customers are looking to build Data lakes to AWS, managing security, catalog and data quality becomes a challenge. Once data is put on Amazon S3, there are multiple processing engines to access it. This could be either through a SQL interface, programmatic, or using API. Customers require federated access to their data with strong controls around Authentication, Authorization, Encryption, and Audit. In this session, we explore the major AWS analytics services and platforms that customers can use to access data in the data Lake and provide best practices on securing them.
Azure SQL Database Managed Instance is a new flavor of Azure SQL Database that is a game changer. It offers near-complete SQL Server compatibility and network isolation to easily lift and shift databases to Azure (you can literally backup an on-premise database and restore it into a Azure SQL Database Managed Instance). Think of it as an enhancement to Azure SQL Database that is built on the same PaaS infrastructure and maintains all it's features (i.e. active geo-replication, high availability, automatic backups, database advisor, threat detection, intelligent insights, vulnerability assessment, etc) but adds support for databases up to 35TB, VNET, SQL Agent, cross-database querying, replication, etc. So, you can migrate your databases from on-prem to Azure with very little migration effort which is a big improvement from the current Singleton or Elastic Pool flavors which can require substantial changes.
Amazon EKS 그리고 Service Mesh
Kubernetes는 컨테이너 서비스를 도입하는 기업들에게 가장 있기있는 Orchestration 플랫폼입니다. 이 세션에서는 아마존에서 6월 정식 출시한 managed Kubenetes서비스인 EKS를 소개해드리며, 오픈소스 버전과의 차이점 및 장점 등에 대해 설명하고, 진보한 마이크로 서비스인 Service Mesh를 구현하는 Linkerd 소개 및 데모를 진행하고자 합니다.
Together, UiPath and CyberArk help organizations improve automation, streamline operations, and eliminate inefficiencies. The joint solution helps organizations scale RPA programs more quickly and accelerate investment returns. Come Learn about the key benefits of the UiPath and CyberArk integration!
This session was presented at Global Microsoft 365 Developer Bootcamp, 2020, Hyderabad, India on 17 October, 2020.
Agenda:
- Manage User Identity
- Role Based Access Control (RBAC)
- Principle of least privilege
- Privileged Identity Management (PIM)
- Real world use cases
Sensitive customer data needs to be protected throughout AWS. This session discusses the options available for encrypting data at rest in AWS. It focuses on several scenarios, including transparent AWS management of encryption keys on behalf of the customer to provide automated server-side encryption and customer key management using partner solutions or AWS CloudHSM. This session is helpful for anyone interested in protecting data stored in AWS.
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Amazon Web Services
As customers are looking to build Data lakes to AWS, managing security, catalog and data quality becomes a challenge. Once data is put on Amazon S3, there are multiple processing engines to access it. This could be either through a SQL interface, programmatic, or using API. Customers require federated access to their data with strong controls around Authentication, Authorization, Encryption, and Audit. In this session, we explore the major AWS analytics services and platforms that customers can use to access data in the data Lake and provide best practices on securing them.
Azure SQL Database Managed Instance is a new flavor of Azure SQL Database that is a game changer. It offers near-complete SQL Server compatibility and network isolation to easily lift and shift databases to Azure (you can literally backup an on-premise database and restore it into a Azure SQL Database Managed Instance). Think of it as an enhancement to Azure SQL Database that is built on the same PaaS infrastructure and maintains all it's features (i.e. active geo-replication, high availability, automatic backups, database advisor, threat detection, intelligent insights, vulnerability assessment, etc) but adds support for databases up to 35TB, VNET, SQL Agent, cross-database querying, replication, etc. So, you can migrate your databases from on-prem to Azure with very little migration effort which is a big improvement from the current Singleton or Elastic Pool flavors which can require substantial changes.
Amazon EKS 그리고 Service Mesh
Kubernetes는 컨테이너 서비스를 도입하는 기업들에게 가장 있기있는 Orchestration 플랫폼입니다. 이 세션에서는 아마존에서 6월 정식 출시한 managed Kubenetes서비스인 EKS를 소개해드리며, 오픈소스 버전과의 차이점 및 장점 등에 대해 설명하고, 진보한 마이크로 서비스인 Service Mesh를 구현하는 Linkerd 소개 및 데모를 진행하고자 합니다.
Together, UiPath and CyberArk help organizations improve automation, streamline operations, and eliminate inefficiencies. The joint solution helps organizations scale RPA programs more quickly and accelerate investment returns. Come Learn about the key benefits of the UiPath and CyberArk integration!
The Essentials | Privileged Access ManagementRyan Gallavin
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
Amazon WorkSpaces: Desktop Computing in the Cloud (ENT104) | AWS re:Invent 2013Amazon Web Services
Desktop virtualization has long held the promise of productivity and security benefits, but has been held back by large CapEx requirements and complicated installation and management. In this session, we provide a detailed introduction to Amazon WorkSpaces, a new AWS service that combines the benefits of desktop virtualization and a cloud-based, pay-as-you-go model. You learn about the key steps for setting up and delivering a secure cloud-based workspace accessed through purpose-built client applications.
Today organizations find themselves in a data rich world with a growing need for increased agility and accessibility of all this data for analysis and deriving keen insights to drive strategic decisions. Creating a data lake helps you to manage all the disparate sources of data you are collecting (in its original format) and extract value. In this session, learn how to architect and implement a data lake in the AWS Cloud. Learn about best practices as we walk through architectural blueprints.
Securing DevOps through Privileged Access ManagementBeyondTrust
In this presentation from the webinar of Security MVP and Microsoft Security Trusted Advisor, Paula Januszkiewicz,get an overview of how privileged access management can help balance DevOps’ need for agility and speed with IT security’s need for visibility, access management, and compliance.
Key use cases covered include:
• Network Segmentation: Grouping assets, including application and resource servers, into logical units that do not trust one another
• Enforcing Appropriate Use of Credentials: IT organizations can leverage these controls to limit lateral movement in the case of a compromise and to provide a secure audit trail
• Elimination of Hard-Coded Passwords: Removing hardcoded passwords in DevOps tool configurations, build scripts, code files, test builds, production builds, etc.
You can watch the full, on-demand webinar here: https://www.beyondtrust.com/resources/webinar/securing-devops-privileged-access-management/
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...Amazon Web Services
File collaboration and management services don’t exist in a vacuum. They need to work well with other applications. The Amazon WorkDocs SDK enables you to use file collaboration and management capabilities with your existing compliance solutions and end-user applications by providing full administrator and user-level access to Amazon WorkDocs site resources. In this chalk talk, we describe how to use Amazon WorkDocs to integrate with your compliance solutions and end-user applications
DER CONFIGURATIONMANAGEMENT PROZESS als Voraussetzung für aktuelle Daten in d...RGillessen
DER CONFIGURATIONMANAGEMENT PROZESS
als Voraussetzung für aktuelle Daten in der CMDB:
Der Configuration Management Prozess
Configuration Management Plan
CMDB-Datenmodell und Datenföderation
CMDB-Schnittstellen und Schnittstellenkontrakte
Auto Discovery von CMDB-Daten und manuelle Datenpflege
Vortrag anlässlich der "CMDB EXPERTENVERANSTALTUNG" im OKTOBER 2010
in München und Stuttgart: „Datendrehscheibe CMDB – Schnitt- oder Nahtstelle im Configuration Management“
With Saba Mobile, Intelligent Talent Management is available anytime, anywhere. Employees can learn, collaborate, find experts and information, crowd source questions, and manage their goals. Managers can check their team’s progress, provide feedback, hold team meetings, conduct interviews, and approve requisitions and offers.
Self-service functionality can assist with password resets, recoveries and account unlocks. By using multiple security questions and answers functionality PortalGuard is able to perform all resets directly from the end-user's machine if desired. This also includes Offline Mode, which allows the forgotten password to be shown to roaming users in clear text when they are offline, so as to continue work without returning to the office.
Tutorial: http://pg.portalguard.com/self-service_password_reset_tutorial
Identity & Access Management Project Challenges and RecoveryHanno Ekdahl
Presented by Hanno Ekdahl at ISACA Atlanta's #GeekWeek2017.
ISACA's 10th Annual Geek Week Conference in Atlanta, GA featured speakers across a wide range of security topics from Risk Management to Penetration Testing. During the conference, policy and technical tracks provided a forum for participants to exchange experiences from the front lines of IT security, including industry best practices as well as driving both accountability and effectiveness for security programs within the organization. The week-long event included plenary and panel sessions, practical workshops and technology demonstrations. This summary presents the key themes, ideas, and considerations that emerged from our Identity Management Presentation at the conference.
AWS delivers an integrated suite of services that provide everything needed to quickly and easily build and manage a data lake for analytics. AWS-powered data lakes can handle the scale, agility, and flexibility required to combine different types of data and analytics approaches to gain deeper insights, in ways that traditional data silos and data warehouses cannot. In this session, we will show you how you can quickly build a data lake on AWS that ingests, catalogs and processes incoming data and makes it ready for analysis. Using a live demo, we demonstrate the capabilities of AWS provided analytical services such as AWS Glue, Amazon Athena and Amazon EMR and how to build a Data Lake on AWS step-by-step.
AWS Workshop Series: Microsoft licensing and active directory on AWSAmazon Web Services
Extend your on-premise Microsoft infrastructure to the cloud using Active Directory. In this workshop we will show you how to set up new domain controllers using Amazon EC2 instances, or create a new standalone forest with AWS Directory Services such as AWS AD Connector and AWS Microsoft AD. Easily administer and monitor your new Active Directory domains using already-familiar tools.
Stressed, Depressed, or Burned Out? The Warning Signs You Shouldn't Ignore (S...Cathrine Wilhelmsen
Stressed, Depressed, or Burned Out? The Warning Signs You Shouldn't Ignore (Presented at SQLBits on March 18th, 2023)
We all experience stress in our lives. When the stress is time-limited and manageable, it can be positive and productive. This kind of stress can help you get things done and lead to personal growth. However, when the stress stretches out over longer periods of time and we are unable to manage it, it can be negative and debilitating. This kind of stress can affect your mental health as well as your physical health, and increase the risk of depression and burnout.
The tricky part is that both depression and burnout can hit you hard without the warning signs you might recognize from stress. Where stress barges through your door and yells "hey, it's me!", depression and burnout can silently sneak in and gradually make adjustments until one day you turn around and see them smiling while realizing that you no longer recognize your house. I know, because I've dealt with both. And when I thought I had kicked them out, they both came back for new visits.
I don't have the Answers™️ or Solutions™️ to how to keep them away forever. But in hindsight, there were plenty of warning signs I missed, ignored, or was oblivious to at the time. In this deeply personal session, I will share my story of dealing with both depression and burnout. What were the warning signs? Why did I miss them? Could I have done something differently? And most importantly, what can I - and you - do to help ourselves or our loved ones if we notice that something is not quite right?
Mesothelioma patients, their loved ones and caregivers experience a plethora of powerful emotions, but the one they most commonly share is anger. We will discuss how to better understand and manage feelings of anger at our September meeting. For more information, visit us at www.asbestos.com
The Essentials | Privileged Access ManagementRyan Gallavin
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
Amazon WorkSpaces: Desktop Computing in the Cloud (ENT104) | AWS re:Invent 2013Amazon Web Services
Desktop virtualization has long held the promise of productivity and security benefits, but has been held back by large CapEx requirements and complicated installation and management. In this session, we provide a detailed introduction to Amazon WorkSpaces, a new AWS service that combines the benefits of desktop virtualization and a cloud-based, pay-as-you-go model. You learn about the key steps for setting up and delivering a secure cloud-based workspace accessed through purpose-built client applications.
Today organizations find themselves in a data rich world with a growing need for increased agility and accessibility of all this data for analysis and deriving keen insights to drive strategic decisions. Creating a data lake helps you to manage all the disparate sources of data you are collecting (in its original format) and extract value. In this session, learn how to architect and implement a data lake in the AWS Cloud. Learn about best practices as we walk through architectural blueprints.
Securing DevOps through Privileged Access ManagementBeyondTrust
In this presentation from the webinar of Security MVP and Microsoft Security Trusted Advisor, Paula Januszkiewicz,get an overview of how privileged access management can help balance DevOps’ need for agility and speed with IT security’s need for visibility, access management, and compliance.
Key use cases covered include:
• Network Segmentation: Grouping assets, including application and resource servers, into logical units that do not trust one another
• Enforcing Appropriate Use of Credentials: IT organizations can leverage these controls to limit lateral movement in the case of a compromise and to provide a secure audit trail
• Elimination of Hard-Coded Passwords: Removing hardcoded passwords in DevOps tool configurations, build scripts, code files, test builds, production builds, etc.
You can watch the full, on-demand webinar here: https://www.beyondtrust.com/resources/webinar/securing-devops-privileged-access-management/
Integrate Amazon WorkDocs with Security & Compliance Solutions & Applications...Amazon Web Services
File collaboration and management services don’t exist in a vacuum. They need to work well with other applications. The Amazon WorkDocs SDK enables you to use file collaboration and management capabilities with your existing compliance solutions and end-user applications by providing full administrator and user-level access to Amazon WorkDocs site resources. In this chalk talk, we describe how to use Amazon WorkDocs to integrate with your compliance solutions and end-user applications
DER CONFIGURATIONMANAGEMENT PROZESS als Voraussetzung für aktuelle Daten in d...RGillessen
DER CONFIGURATIONMANAGEMENT PROZESS
als Voraussetzung für aktuelle Daten in der CMDB:
Der Configuration Management Prozess
Configuration Management Plan
CMDB-Datenmodell und Datenföderation
CMDB-Schnittstellen und Schnittstellenkontrakte
Auto Discovery von CMDB-Daten und manuelle Datenpflege
Vortrag anlässlich der "CMDB EXPERTENVERANSTALTUNG" im OKTOBER 2010
in München und Stuttgart: „Datendrehscheibe CMDB – Schnitt- oder Nahtstelle im Configuration Management“
With Saba Mobile, Intelligent Talent Management is available anytime, anywhere. Employees can learn, collaborate, find experts and information, crowd source questions, and manage their goals. Managers can check their team’s progress, provide feedback, hold team meetings, conduct interviews, and approve requisitions and offers.
Self-service functionality can assist with password resets, recoveries and account unlocks. By using multiple security questions and answers functionality PortalGuard is able to perform all resets directly from the end-user's machine if desired. This also includes Offline Mode, which allows the forgotten password to be shown to roaming users in clear text when they are offline, so as to continue work without returning to the office.
Tutorial: http://pg.portalguard.com/self-service_password_reset_tutorial
Identity & Access Management Project Challenges and RecoveryHanno Ekdahl
Presented by Hanno Ekdahl at ISACA Atlanta's #GeekWeek2017.
ISACA's 10th Annual Geek Week Conference in Atlanta, GA featured speakers across a wide range of security topics from Risk Management to Penetration Testing. During the conference, policy and technical tracks provided a forum for participants to exchange experiences from the front lines of IT security, including industry best practices as well as driving both accountability and effectiveness for security programs within the organization. The week-long event included plenary and panel sessions, practical workshops and technology demonstrations. This summary presents the key themes, ideas, and considerations that emerged from our Identity Management Presentation at the conference.
AWS delivers an integrated suite of services that provide everything needed to quickly and easily build and manage a data lake for analytics. AWS-powered data lakes can handle the scale, agility, and flexibility required to combine different types of data and analytics approaches to gain deeper insights, in ways that traditional data silos and data warehouses cannot. In this session, we will show you how you can quickly build a data lake on AWS that ingests, catalogs and processes incoming data and makes it ready for analysis. Using a live demo, we demonstrate the capabilities of AWS provided analytical services such as AWS Glue, Amazon Athena and Amazon EMR and how to build a Data Lake on AWS step-by-step.
AWS Workshop Series: Microsoft licensing and active directory on AWSAmazon Web Services
Extend your on-premise Microsoft infrastructure to the cloud using Active Directory. In this workshop we will show you how to set up new domain controllers using Amazon EC2 instances, or create a new standalone forest with AWS Directory Services such as AWS AD Connector and AWS Microsoft AD. Easily administer and monitor your new Active Directory domains using already-familiar tools.
Stressed, Depressed, or Burned Out? The Warning Signs You Shouldn't Ignore (S...Cathrine Wilhelmsen
Stressed, Depressed, or Burned Out? The Warning Signs You Shouldn't Ignore (Presented at SQLBits on March 18th, 2023)
We all experience stress in our lives. When the stress is time-limited and manageable, it can be positive and productive. This kind of stress can help you get things done and lead to personal growth. However, when the stress stretches out over longer periods of time and we are unable to manage it, it can be negative and debilitating. This kind of stress can affect your mental health as well as your physical health, and increase the risk of depression and burnout.
The tricky part is that both depression and burnout can hit you hard without the warning signs you might recognize from stress. Where stress barges through your door and yells "hey, it's me!", depression and burnout can silently sneak in and gradually make adjustments until one day you turn around and see them smiling while realizing that you no longer recognize your house. I know, because I've dealt with both. And when I thought I had kicked them out, they both came back for new visits.
I don't have the Answers™️ or Solutions™️ to how to keep them away forever. But in hindsight, there were plenty of warning signs I missed, ignored, or was oblivious to at the time. In this deeply personal session, I will share my story of dealing with both depression and burnout. What were the warning signs? Why did I miss them? Could I have done something differently? And most importantly, what can I - and you - do to help ourselves or our loved ones if we notice that something is not quite right?
Mesothelioma patients, their loved ones and caregivers experience a plethora of powerful emotions, but the one they most commonly share is anger. We will discuss how to better understand and manage feelings of anger at our September meeting. For more information, visit us at www.asbestos.com
Total Stress Management Guide For Nurses Dr Shriniwas Kashalikarsrinishriya
Dr. Shriniwas Janardan Kashalikar's new; empowering and enlightening experiences; and inspiring insights; based on study of Gita, Vishnusahasranam, Namasmaran and life; for individual and global blossoming!
The Battle of the Data Transformation Tools (PASS Data Community Summit 2023)Cathrine Wilhelmsen
The Battle of the Data Transformation Tools (Presented as part of the "Batte of the Data Transformation Tools" Learning Path at PASS Data Community Summit on November 16th, 2023)
Visually Transform Data in Azure Data Factory or Azure Synapse Analytics (PAS...Cathrine Wilhelmsen
Visually Transform Data in Azure Data Factory or Azure Synapse Analytics (Presented as part of the "Batte of the Data Transformation Tools" Learning Path at PASS Data Community Summit on November 15th, 2023)
Building an End-to-End Solution in Microsoft Fabric: From Dataverse to Power ...Cathrine Wilhelmsen
Building an End-to-End Solution in Microsoft Fabric: From Dataverse to Power BI (Presented at SQLSaturday Oregon & SW Washington on November 11th, 2023)
"I can't keep up!" - Turning Discomfort into Personal Growth in a Fast-Paced ...Cathrine Wilhelmsen
"I can't keep up!" - Turning Discomfort into Personal Growth in a Fast-Paced World (Presented at SQLBits on March 17th, 2023)
Do you sometimes think the world is moving so fast that you're struggling to keep up?
Does it make you feel a little uncomfortable?
Awesome!
That means that you have ambitions. You want to learn new things, take that next step in your career, achieve your goals. You can do anything if you set your mind to it.
It just might not be easy.
All growth requires some discomfort. You need to manage and balance that discomfort, find a way to push yourself a little bit every day without feeling overwhelmed. In a fast-paced world, you need to know how to break down your goals into smaller chunks, how to prioritize, and how to optimize your learning.
Are you ready to turn your "I can't keep up" into "I can't believe I did all of that in just one year"?
Lessons Learned: Implementing Azure Synapse Analytics in a Rapidly-Changing S...Cathrine Wilhelmsen
Lessons Learned: Implementing Azure Synapse Analytics in a Rapidly-Changing Startup (Presented at SQLBits on March 11th, 2022)
What happens when you mix one rapidly-changing startup, one data analyst, one data engineer, and one hypothesis that Azure Synapse Analytics could be the right tool of choice for gaining business insights?
We had no idea, but we gave it a go!
Our ambition was to think big, start small, and act fast – to deliver business value early and often.
Did we succeed?
Join us for an honest conversation about why we decided to implement Azure Synapse Analytics alongside Power BI, how we got started, which areas we completely messed up at first, what our current solution looks like, the lessons learned along the way, and the things we would have done differently if we could start all over again.
6 Tips for Building Confidence as a Public Speaker (SQLBits 2022)Cathrine Wilhelmsen
6 Tips for Building Confidence as a Public Speaker (Presented at SQLBits on March 10th, 2022)
Do you feel nervous about getting on stage to deliver a presentation?
That was me a few years ago. Palms sweating. Hands shaking. Voice trembling. I could barely breathe and talked at what felt like a thousand words per second. Now, public speaking is one of my favorite hobbies. Sometimes, I even plan my vacations around events! What changed?
There are no shortcuts to building confidence as a public speaker. However, there are many things you can do to make the journey a little easier for yourself. In this session, I share the top tips I have learned over the years. All it takes is a little preparation and practice.
You can do this!