Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitize advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitizing data in live/active environments
See the slides to learn how your data center can minimize business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Blancco
Learn how to protect data throughout its lifecycle- from initial creation through destruction. View the presentation to get specific tips on how to protect your business.
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
We are excited to talk to you about our new and upcoming features and enhancements in our data erasure products. Russ Ernst, VP of Product Management and Cornelius Bührle, Director of Sales Engineering, will guide you through our latest improvements to show you how they can help provide the most trusted and efficient solution for your IT asset disposition.
During this webinar, you’ll learn about:
New Blancco Drive Eraser features:
NVMe Erasure
Smart Info collection
New Blancco Mobile Device Erase features:
Dynamic Workflow
Diagnostic of Devices
New Blancco Management Console features:
BI Dashboard
Export improvements (config of filename)
User Group management improvements (moving user groups + search)
Making the Case- Blancco Data Center Eraser Solution Blancco
Ready to make your data center more secure and efficient? Find out how data erasure can benefit your data center, then use these slides to make the case to your Data Center Manager, CIO or other C-Suite exec. This quick overview of the Blancco Data Center Eraser solution and the issues it addresses will have you dubbed “The Data Center Problem-Solver” in no time.
Download the slides to learn about:
What constitutes data erasure and how and when to perform data erasure across the entire data lifecycle
How secure server decommissioning at-scale helps you meet security and compliance without compromising efficiency
Benefits of implementing a company-wide data sanitization solution vs. keeping assets on site or outsourcing destruction
Why Your Approach To Data Governance Needs a Major UpdateDelphix
Data is the fuel that powers today’s application-driven businesses. But efficiently governing this data is becoming harder as it grows in volume and proliferates across cloud and on-prem environments. Questions like “Where is my sensitive data located?,” “How do we protect it from breach?” and “How do I ensure the right people have access to it?” are becoming more difficult to answer.
With the clock counting down on enforcement of EU GDPR in May 2018, global businesses are determining how to comply with what may be the most stringent data privacy regulation ever. GDPR and its associated penalties —up to 4% of global revenue—apply to both EU and non-EU businesses alike.
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitize advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitizing data in live/active environments
See the slides to learn how your data center can minimize business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Blancco
Learn how to protect data throughout its lifecycle- from initial creation through destruction. View the presentation to get specific tips on how to protect your business.
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
We are excited to talk to you about our new and upcoming features and enhancements in our data erasure products. Russ Ernst, VP of Product Management and Cornelius Bührle, Director of Sales Engineering, will guide you through our latest improvements to show you how they can help provide the most trusted and efficient solution for your IT asset disposition.
During this webinar, you’ll learn about:
New Blancco Drive Eraser features:
NVMe Erasure
Smart Info collection
New Blancco Mobile Device Erase features:
Dynamic Workflow
Diagnostic of Devices
New Blancco Management Console features:
BI Dashboard
Export improvements (config of filename)
User Group management improvements (moving user groups + search)
Making the Case- Blancco Data Center Eraser Solution Blancco
Ready to make your data center more secure and efficient? Find out how data erasure can benefit your data center, then use these slides to make the case to your Data Center Manager, CIO or other C-Suite exec. This quick overview of the Blancco Data Center Eraser solution and the issues it addresses will have you dubbed “The Data Center Problem-Solver” in no time.
Download the slides to learn about:
What constitutes data erasure and how and when to perform data erasure across the entire data lifecycle
How secure server decommissioning at-scale helps you meet security and compliance without compromising efficiency
Benefits of implementing a company-wide data sanitization solution vs. keeping assets on site or outsourcing destruction
Why Your Approach To Data Governance Needs a Major UpdateDelphix
Data is the fuel that powers today’s application-driven businesses. But efficiently governing this data is becoming harder as it grows in volume and proliferates across cloud and on-prem environments. Questions like “Where is my sensitive data located?,” “How do we protect it from breach?” and “How do I ensure the right people have access to it?” are becoming more difficult to answer.
With the clock counting down on enforcement of EU GDPR in May 2018, global businesses are determining how to comply with what may be the most stringent data privacy regulation ever. GDPR and its associated penalties —up to 4% of global revenue—apply to both EU and non-EU businesses alike.
Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardians, and staff.
This presentation covers PCI DSS-related myths and misconceptions that are common among some merchants and other organizations dealing with PCI DSS challenges. Mistakes related to technical and process side of PCI, self-assessment and audits as well as PCI validation requirements will be discussed. The information will be useful to all merchants dealing with credit card information and thus struggling with PCI DSS mandates.
From tape and disc to cloud and virtualization, panelists break down the spectrum of disaster recovery methods and offer techniques to prepare for the different causes of data loss experienced in the financial services industry.
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Solutions (Formerly Automic) and CA Privileged Access Manager
For more information on DevSecOps, please visit: http://ow.ly/u2pN50g63tN
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
https://www.securityforum.org/research/data-leakage-prevention-briefing-paper/
This presentation, drawn the the ISF's latest Data Leakage Prevention briefing paper, provides a 3-phased approach to implementing an effective data leakage prevention programme, that goes beyond installing DLP tools and technology.
By implementing a DLP programme, organisations can significantly reduce the risk of data leakage to protect their reputation, avoid litigation, meet regulatory obligations and protect IP’s.
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesBlancco
Solid state drives are fast, efficient and outperform many other storage technologies. But they also come with hidden risks when they reach end of life. Data erasure
For 20 years, Blancco has offered solutions that support compliance with data protection and privacy regulations. We
support the need for heavily-regulated industries to stay compliant with these regulations with data erasure solutions that
satisfy (and often exceed) those requirements.
Blancco Data Erasure works across the entire enterprise and lifecycle of every IT asset. We support highly-regulated
industries, such as finance, healthcare and government, by assisting in the development and enforcement of data removal
policies to prove compliance and achieve data sanitization.
An Introduction to Live Environment and Cloud EraserBlancco
Session slides from our recent “Today’s Data Security Risks: How to Reduce Your Attack Surface” event in Singapore. Director of Cloud and Datacenter Eraser Solutions, Fredrik Forslund provides a thorough intro to LEE and cloud eraser.
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsStorage Switzerland
IT professionals know that the ultimate test of the data protection process is performing a recovery; whether a single server recovery or recovering an entire data center. That said, we are all guilty of focusing too much on the backup process rather than trying to reduce the amount of downtime following a system failure. In this webinar, George Crump, founder of Storage Switzerland and Ian McChord from Datto will provide you with the five critical questions you need to answer in order to reduce or even eliminate downtime.
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
Slides from the GDPR Security Roundtable hosted in Zurich. Part 1 of 2.
“The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world" - Goal of the General Data Protection Regulation.
Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardians, and staff.
This presentation covers PCI DSS-related myths and misconceptions that are common among some merchants and other organizations dealing with PCI DSS challenges. Mistakes related to technical and process side of PCI, self-assessment and audits as well as PCI validation requirements will be discussed. The information will be useful to all merchants dealing with credit card information and thus struggling with PCI DSS mandates.
From tape and disc to cloud and virtualization, panelists break down the spectrum of disaster recovery methods and offer techniques to prepare for the different causes of data loss experienced in the financial services industry.
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Solutions (Formerly Automic) and CA Privileged Access Manager
For more information on DevSecOps, please visit: http://ow.ly/u2pN50g63tN
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
https://www.securityforum.org/research/data-leakage-prevention-briefing-paper/
This presentation, drawn the the ISF's latest Data Leakage Prevention briefing paper, provides a 3-phased approach to implementing an effective data leakage prevention programme, that goes beyond installing DLP tools and technology.
By implementing a DLP programme, organisations can significantly reduce the risk of data leakage to protect their reputation, avoid litigation, meet regulatory obligations and protect IP’s.
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesBlancco
Solid state drives are fast, efficient and outperform many other storage technologies. But they also come with hidden risks when they reach end of life. Data erasure
For 20 years, Blancco has offered solutions that support compliance with data protection and privacy regulations. We
support the need for heavily-regulated industries to stay compliant with these regulations with data erasure solutions that
satisfy (and often exceed) those requirements.
Blancco Data Erasure works across the entire enterprise and lifecycle of every IT asset. We support highly-regulated
industries, such as finance, healthcare and government, by assisting in the development and enforcement of data removal
policies to prove compliance and achieve data sanitization.
An Introduction to Live Environment and Cloud EraserBlancco
Session slides from our recent “Today’s Data Security Risks: How to Reduce Your Attack Surface” event in Singapore. Director of Cloud and Datacenter Eraser Solutions, Fredrik Forslund provides a thorough intro to LEE and cloud eraser.
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsStorage Switzerland
IT professionals know that the ultimate test of the data protection process is performing a recovery; whether a single server recovery or recovering an entire data center. That said, we are all guilty of focusing too much on the backup process rather than trying to reduce the amount of downtime following a system failure. In this webinar, George Crump, founder of Storage Switzerland and Ian McChord from Datto will provide you with the five critical questions you need to answer in order to reduce or even eliminate downtime.
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
Slides from the GDPR Security Roundtable hosted in Zurich. Part 1 of 2.
“The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world" - Goal of the General Data Protection Regulation.
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALETIBCO Jaspersoft
TIBCO has a new, best-in-class data virtualization tool, TIBCO Jaspersoft® Advanced Data Services. This new service can have a big impact on performance—particularly in scenarios that involve combining three or more data sources or accessing high volumes of data. It is also capable of performing complex joins and data transformations that aren’t possible in Jaspersoft® Domains.
Join our customer-exclusive webinar for an introduction to Jaspersoft Advanced Data Services, its use cases, and how it compares to existing Jaspersoft data integration options.
Specifically, you’ll learn:
How Jaspersoft Advanced Data Services compares to other Jaspersoft data integration options: Jaspersoft ETL and Jaspersoft Virtual Data Sources (Domains)
What use case scenarios are particularly well-suited for Jaspersoft Advanced Data Services
Through product demonstrations, how Jaspersoft Advanced Data Services works
How to try Jaspersoft Advanced Data Services for free
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Antony Welfare
The retail industry is a globally connected network of suppliers, brands, retailers and customers interacting in both physical stores and with digital online channels. This makes the retail industry an ideal beneficiary for the blockchain revolution. Join us to explore the ways in which retailers can benefit from blockchain now and over the next few years.
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...Senturus
Senturus special guest Mark Madsen, keynote speaker at the TDWI World Conference, shares his insights into the five major issues facing data warehouses and his solution to increase agility and flexibility. View the webinar video recording and download this deck: http://www.senturus.com/resources/rethinking-the-data-warehouse/.
Current data warehouses are not architected to meet current analytics requirements including end user self-service, multiple tools, huge data volumes, visualizations and deeper analysis needs. Hear Mark’s strategic insights for how to solve these issues.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
Data brings value that informs the mobile device journey, helps businesses make key processing decisions, improves processing efficiency and dictates disposition path across the omni-channel. By harnessing the power of this data across the mobile device lifecycle, you can optimize value by shortening the time your devices spend in the warehouse.
Join this session to learn how to:
Simplify grading, erasure, and diagnostics across the device ecosystem
Enable solution-focused API integration with existing ERP / WMS / AMS systems
Employ lean processing principals
Enabling End-to-End Mobile Customer JourneyBlancco
s your organization achieving added value by tracking mobile devices across the full customer journey?
Tracking devices from mobile device acquisition (trade-in / buy-back) to reverse logistics (mobile processing / repair / omni-channel disposition) allows businesses to make informed, timely decisions to increase efficiency, profit, and customer satisfaction.
Join this session to learn how new technologies are creating a shift in the mobile retail space and driving business intelligence across the full mobile ecosystem.
- Mobile Refurbished Market Data
- New Blancco Mobile Diagnostics & Erasure releases
- Potential time savings from Blancco Mobile Diagnostics app
- Mobile Carrier Insights integration overview
- Blancco cosmetic grading overview
- Events & industry news
- Q&A
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
From the IAPP Canada Privacy Symposium in May 2017. This is the full upload of Blancco Chief Strategy Officer Richard Stiennon's presentation, "Data Retention Is a Team Sport: How to Get It Right."
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
Explore key stats from our data protection research study and learn how you can stay compliant with security regulations.
See the full research study here: https://www.blancco.com/resources/research-studies/data-protection-prioritizing-regulations-guidelines/
Data erasure's role in limiting cyber attacksBlancco
With over 300 million records leaked and over $1 billion stolen in 2015, chances are your organization has been, or will be, affected by a cyber attack. But with a few data retention policies and enforcement mechanisms, the future landscape of data security could drastically improve.
Longtime cyber security expert and Blancco Technology Group’s Chief Strategy Officer, Richard Stiennon, sheds light on how organizations should think about data lifecycle management to limit their exposure to cyber attacks.
What You’ll Learn:
The current landscape of cyber risks and threats
How to prioritize data lifecycle management within your overall security objectives
How organizations can establish policies to reduce the impact of cyber hacks by continuously removing data from IT assets, devices, storage environments and virtual machines
Why organizations should leverage data erasure as an indispensable tool in fending off cyber attacks
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
Do organizations have a defined process for wiping sensitive company information before discarding/reselling old drives and mobile devices?
In this webinar, Randy F. Smith and data security experts from Blancco Technology Group explore the following topics:
- How easily residual data can be recovered from hard drives and mobile devices
- The risks leftover data can pose to organizations
- The most secure ways to wipe company data from end-of-life devices and drives
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
What I want to build out for each Solution we are going to take for each vertical.
How can we broaden our relationship with ITADs – one of the key areas is in approaching the data center.
We want to pass this down to Ingram micro itad – to give them a better view into the full capabilities that we provide in the data center.
All existing tiered data centers need to achieve a Power Effectiveness Rating (PUE) of 1.5 and all new data centers must have a PUE of 1.2. The GAO predicts a savings of $8.2 billion.
53% of respondents said technical difficulties are delaying decisions on consolidation projects – SafeNet Research Study (add or mention??)
http://www.datacenterjournal.com/nvme-change-agent-next-gen-data-centers/
NVMe-enabled storage infrastructures are not only seeing wide deployment, but they’re now entering other data center areas that were once typically reserved for legacy HDDs and SSDs. (DataCenter Journal)
NVMe will continue to replace SAS and SATA as the interface for enterprise drives. RAID is succumbing to the inevitability of all-flash arrays and SSD storage appliances. (Network Computing)
By 2019, SSDs are expected to be in about 56% of notebooks and desktops. (ComputerWorld)
https://blog.equinix.com/blog/2017/08/03/are-you-ready-to-migrate-your-data-center-to-the-cloud/
https://datacenterfrontier.com/overcoming-data-center-migration-challenges-staged-approach/
Other stats to mention:
By 2020, 86% of companies will be interconnecting multiple clouds across multiple locations and over the next five years to realize a lower Capex. (Equinix)
Gartner says that “a multicloud strategy will become the common strategy for 70% of enterprises by 2019, up from less than 10% today.”[1]
Question: In 2018, what is the top challenge facing your data centre(s)?
Answers (select one):
Data Security / Data Loss
Increasing infrastructure complexity
Staff Issues (talent shortage, training, retaining)
Increasing infrastructure complexity
Reduced budgets
NOTES FROM RUSS:
Have to pass the security requirements, but that isn’t the day job
Their biggest concern is they have this stuff piling up but they can’t do anything because of these strict security rules
Erase or fails on the erasure side and report back to security/compliance teams
Need least friction as possible as they go through this process
A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud,
(don’t forget about Fred slide about use cases that looks like this one!)
What data protection regulations are you required to meet within your data center? (select all that apply)
HIPAA
FISMA High
PCI-DSS 3.1
SOC 2 Type II, SOC 3
ISO 27001
ISO 50001
OTHER: Please Specify
FREDRIK
What is data sanitisation?
The process of deliberately permanently and irreversibly removing or destroying the data stored on a memory device to make it unrecoverable
The process of ensuring all incorrect, duplicate or unused data is properly classified and migrated into the appropriate lifecycle stage, archival or destruction on an ongoing basis through automated policy enforcement
The process of ensuring shared company data is clear of viruses and malware that can compromise the network, creating areas for breaches
ANSWER: A
Which data sanitisation method are you using to meet your data protection regulations today?
Physical destruction
Encryption
Data Erasure
Outsource to Third Party
Not Sure
Other: Please specify
Best practice is a combination of these (physical destruction is part of it, but should do erasure/encryption with certificate of sanitization you can show auditors at will)
Get this done week of 21st.
A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud,
Poll question:
What is your process when you are decommissioning servers to bring in new hardware?
Pull drives manually and wipe them one by one
Pull each server out of the rack and wipe on a per server basis
We erase servers while in rack and wipe a rack at a time
Other
Need to understand how they connect the servers to the MC – need to be clear HOW we do this.
232323
What data sanitisation method do you use to erase advanced media like NVMe, m.2 SSD drives?
Destruction
Standard overwrite
We don’t sanitise, but store instead
Other (specify)
Speak to Verification step! Certification (so they don’t store it in their storage and think that is OK)
Reference NIST 800 80R1 that on the slide.
What is your data sanitisation process to avoid data spillage or to securely move customer data in a live system?
We would remove the hardware, the destroy it and rebuild the system
We don’t do anything
We have a home grown system that sanitisation the data
We delete the virtual machines
Other: Please specify
You will not get serial drive numbers in the report or execute hardware erasure commands (no purge on SSD) – you aren’t running dialog with the drive directly, you are running on the operating system.
Connect Blancco and easily target data on logical level within the cabinet that needs to be erased – without removing drives or risking system functionality (can be done in the operational environment systems can be online)
We sit on top of the server (you don’t need to reboot), we will list everything that is available
You can target all LUNs and erase them (no cables, no appliance). The software can be deployed remotely or locally with admin account
Erases the mounted user accessible part of functional drives and assemblies of drives
Erase any type of disk drive supported by Microsoft Windows, including IDE, SCSI, FC and iSCSI in both 32-bit and 64-bit systems
Erase disk drives supported by the Unix operating system in hand, including IDE, SCSI, FC and iSCSI
De facto standard in data erasure
1400+ Customers
Permanent data removal with 100% tamper-proof audit trail
Tested, certified, approved and recommended by 18 governing bodies around the world
We have 18 global certifications.
If customer ask why don’t we have any in the US – it is because there are no certification in the US! Blog post coming.
Produces a 100% certified data erasure and tamper-proof audit trailSo you can ensure compliance with industry standards and regulations, including PCI DSS, HIPAA, SOX, ISO 27001, ISO 27040 and EU General Data Protection Regulation