Hi [[ session.user.profile.firstName ]]

Application Development

  • Microservices, Containers, APIs and Integration Day with Red Hat
    Microservices, Containers, APIs and Integration Day with Red Hat Red Hat Recorded: Jul 20 2018 3 mins
    Watch a preview of what to expect at Red Hat's "Transform your Enterprise IT with Microservices, Containers, APIs, and Integration Day" event.
  • Sysdig & SANS Institute: Forensics and Incident Response in Containers
    Sysdig & SANS Institute: Forensics and Incident Response in Containers Knox Anderson, Sysdig and Jake Williams, SANS Analyst Recorded: Jul 20 2018 61 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Digital Transformation – North American Utility & Power Trends
    Digital Transformation – North American Utility & Power Trends John Villali, Research Director, IDC Energy Insights Recorded: Jul 19 2018 17 mins
    Today's power markets in North America are facing changes and challenges which are driving investment and activity in the industry's digital transformation efforts. This webinar will give an overview of the major drivers, trends and activities where technology investments are being made as the utility and power sector takes on digital transformation.
  • Data Science Digest: Source Code Metrics that Matter
    Data Science Digest: Source Code Metrics that Matter Dr. Maciej Gryka, Sr. Data Science Manager, Rainforest QA Recorded: Jul 19 2018 46 mins
    Data scientists have spent decades trying to figure out how to qualitatively evaluate code quality to better understand what is “good” code and what isn’t - objectively, definitively and without emotion. While it is an interesting area to explore, is it a futile effort? After all, it isn’t uncommon for developers to disagree on how code should be approached to reach the same outcome.

    Join “Data Science Digest: Source Code Metrics that Matter,” where Dr. Maciej Gryka, Sr. Data Science Manager at Rainforest, shares his compiled learnings on the topics of Data Science, Machine Learning and Software Quality. In this session, he’ll cover:

    - Quantitative source code metrics that matter
    - How these quality metrics are useful in actual day-to-day work
    - How people are trying to solve this problem with machine learning

    This is the first in his series of literature reviews for people who are interested in learning about notable research journals.
  • Kubernetes is the Platform. Now what?
    Kubernetes is the Platform. Now what? Brian Gracely, Director of Product Strategy, Red Hat Recorded: Jul 19 2018 63 mins
    In 2017, the industry standardized on Kubernetes on the defacto container scheduler. So what does Kubernetes deliver, and how much more is needed to operate and maintain a container application platform? Learn from Red Hat’s leadership in the Kubernetes community, and many years of OpenShift customer deployments, how to enable an application platform that is built to optimize developer productivity, security and multi-cloud deployments.
  • Bringing Microservices to .NET: Modernizing Windows Applications as Cloud-Native
    Bringing Microservices to .NET: Modernizing Windows Applications as Cloud-Native Robert Sirchia, Magenic and Chris Umbel, Pivotal Recorded: Jul 19 2018 40 mins
    Building a new application with the latest and greatest methodologies and frameworks? Sounds like fun! Modernizing the legacy .NET applications that have been driving your business for years? Sounds…painful.

    Fortunately, a number of new technologies have emerged for the .NET ecosystem to support cloud-native .NET applications, and the processes for analyzing and modernizing them have matured.

    In this webinar, join Magenic's Robert Sirchia and Pivotal's Chris Umbel to learn about modernizing .NET applications from a legacy Windows environment. The session will cover topics like:

    - How can I determine which .NET applications from my portfolio to modernize?
    - How do I decompose a monolithic .NET application into logical business domains?
    - Which technologies, like Steeltoe, are available to adopt modern microservices architectures for .NET applications?
    - How do I analyze the cloud-suitability of a portfolio of applications and prioritize it for modernization?


    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    Magenic Privacy Statement:
    https://magenic.com/privacy

    This webinar:
    https://content.pivotal.io/webinars/jul-19-bringing-microservices-to-net-modernizing-windows-applications-as-cloud-native-webinar
  • Modernizing SAP with scriptless testing
    Modernizing SAP with scriptless testing Thomas Koeppner, Micro Focus Recorded: Jul 19 2018 49 mins
    SAP modernization presents a combination of business challenges and technical challenges, both of which must be overcome in order to achieve a successful transformation. For best results, the business experts and the technical experts must work together on the transformation, and in particular, when testing updates to the SAP system. Scriptless testing is the most effective way to bridge the gap between those with an intimate understanding of the business processes, and those more at home with the technical details of SAP.

    This webinar will explore some of the challenges of testing SAP systems, and explain how scriptless test automation, using Micro Focus Business Process Testing (BPT), allows business users to define the processes, flows and data to be tested, while automation engineers implement the automated components that form each test’s building blocks.

    Takeaways
    • Understand the challenges of testing of critical systems such as SAP
    • Discover how scriptless testing can bring technical and business experts together to create effective automated tests
    • Understand how the components underlying scriptless test can be reused across different tests, and maintained with ease
  • 3 Challenges of Distributed Agile Retrospectives & How to Solve Them
    3 Challenges of Distributed Agile Retrospectives & How to Solve Them Michael Ball-Marian, Agile Expert at CA Technologies Recorded: Jul 19 2018 58 mins
    Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.

    Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.

    Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
  • Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift
    Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift Tsvi Korren - Chief Solutions Architect at Aqua Security Recorded: Jul 19 2018 48 mins
    One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do.

    With immutability, every attempt to change the runtime environment is interpreted as an anomaly. And, thanks to containers’ simplicity, it is easier to predict their behavior in the application context and create a tight security envelope, allowing them to perform only their required function and preventing behaviors outside that scope.

    In this webinar, Tsvi Korren, Chief Solutions Architect at Aqua Security, will explain and demonstrate how an approach that enforces immutability and least privilege can secure applications in an active container environment.
  • Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics
    Software Metrics Worth Measuring: Aligning Business Goals to Quality Metrics Adam Satterfield, Technology Program Director at Anthem and Ryan Yackel, Director of Product at QASymphony Recorded: Jul 19 2018 56 mins
    In today’s hyper-competitive software market, companies are ever pressing to deliver products more quickly and efficiently. As a result, it is imperative for organizations to implement a more strategic approach to quality. A strategic approach requires QA teams to gather more comprehensive data on the value of quality tasks in the delivery pipeline. And it often requires a different approach to reporting, and a focus on metrics that help the business measure release readiness and assess overall application quality.

    Join us as Adam Satterfield shares the key metrics today’s software QA teams should be collecting, how to tell the story of your data and how to better understand different audiences within your organization to deliver insights that matter. Ryan Yackel will also dive into how some of these insights can be applied in qTest Insights.

    In this webinar, you will learn how to gather the metrics for 3 key areas to demonstrate business value, including:

    - The cost of a defect
    - Efficiency gains from test automation
    - Risk identification through coverage metrics
  • Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security
    Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security From CA Technologies: Sanjay Tailor, Mehdi Medjaoui, Robert Lindberg, David Chui Recorded: Jul 19 2018 61 mins
    Whether driven by PSD2 compliance, market demand for mobile apps, or fintech competition, open banking is becoming a top priority for financial businesses. Through exclusive research and customer successes, we determined that building a modern application architecture with APIs, microservices and strong authentication is a key success factor in this space. In fact, our latest report shows that fully digital banks enjoy an estimated 25% cost-to-income ratio, versus 60% for traditional institutions.

    For this webcast, we assembled a panel that includes Mehdi Medjaoui, author of Banking APIs: State of the Market, along with experts in API and security capabilities, to introduce the elements of modern application architecture that all digital banking business leaders should know about – API management, microservices, strong authentication and risk-based security. You’ll learn about:

    * The current state of open banking, and what your peers are doing

    * How to invest in modern application architecture to improve your open banking projects

    * How to align better with IT to accelerate your time-to-market

    All registrants will also benefit from a complimentary copy of our Banking APIs: State of the Market report.
  • Extending Data Protector  & HPE StoreOnce into the Cloud
    Extending Data Protector & HPE StoreOnce into the Cloud Nigel Blake, Presales Consultant, Micro Focus & Brynn Harrison, Storage Consultant, Hewlett-Packard Enterprise Recorded: Jul 19 2018 59 mins
    Attend our informative 50-minute webinar to learn how Data Protector and HPE StoreOnce can utilise Cloud storage from AWS and Azure.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start Robbie Carroll, Account Manager, AWS Recorded: Jul 19 2018 42 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Recorded: Jul 19 2018 38 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive Mike Cooper, Sr. Security Manager Recorded: Jul 18 2018 24 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • Serverless Language Translation On-the-Fly with Microsoft Translator
    Serverless Language Translation On-the-Fly with Microsoft Translator Johnathan Flowers Recorded: Jul 18 2018 22 mins
    Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.

    With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.

    In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Recorded: Jul 18 2018 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications Keith Mokris, Product Marketing Lead, Twistlock Recorded: Jul 18 2018 30 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.
  • NS1 Private DNS: Getting You Out of a BIND
    NS1 Private DNS: Getting You Out of a BIND Jonathan Lewis, VP Product Marketing Recorded: Jul 18 2018 31 mins
    Cloud architectures, microservices, and infrastructure scale have exposed unmet needs in DNS that now hamper modernization efforts, including the need for flexible traffic management, service discovery, rapid propagation, and comprehensive API support.

    In this webinar, we introduce Private DNS, NS1's next-generation DNS software product providing authoritative and recursive DNS services. Private DNS is designed primarily for deployment within enterprise intranets to meet the needs of user to user, user to device/application and application to application communication.

    We'll cover:

    - Current challenges managing DNS systems
    - How NS1 is different
    - Use cases
    - Deployment and best practices
  • Jakarta EE: What does it mean for the future of Java?
    Jakarta EE: What does it mean for the future of Java? Dr. Mark Little, Vice President Engineering, Red Hat Recorded: Jul 18 2018 34 mins
    In case you missed it, Java EE was given a new home at the Eclipse Foundation and on 26th February Jakarta EE was chosen as the new name for Java™ EE. Join this session to gain an understanding where Jakarta EE is heading and how customers and communities can help drive the future of enterprise Java.

    Java EE has been the dominant enterprise Java standard for well over a decade. However, in recent years there has been confusion and concern around its future promoting new efforts such as Eclipse MicroProfile to take just enough Java EE into the world of cloud and microservices. But all of that changed in 2017 when Oracle announced that, working with Red Hat and IBM, they were donating all of Java EE to the Eclipse Foundation and to be rebranded as Jakarta EE. What does this mean for the future of enterprise Java and traditional Java application servers?

    Dr. Mark Little, vice president, Enjgineering, Red Hat
    Mark Little leads the technical direction, research, and development for Red Hat® JBoss® Middleware. Prior to 2008, Mark served as the SOA technical development manager and director of standards. Additionally, he was a chief architect and co-founder at Arjuna Technologies, a spin-off from HP, where he was distinguished engineer. Mark has worked in the area of reliable distributed systems for more than 30 years.

    https://twitter.com/nmcl
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start AWS Recorded: Jul 18 2018 25 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • A Framework to turn IoT Technology into Operational Capability for Mining
    A Framework to turn IoT Technology into Operational Capability for Mining Pieter van Schalkwyk, CEO, XMPro Recorded: Jul 17 2018 58 mins
    Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.

    This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.

    This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
  • Trends in Security: How to Create a Scalable Threat-modeling Practice
    Trends in Security: How to Create a Scalable Threat-modeling Practice Chandu Ketkar, Principal Consultant, Synopsys Recorded: Jul 17 2018 45 mins
    For most organizations, performing threat-modeling is a difficult and an expensive undertaking. There are good reasons why this is the case. Threat modeling traditionally requires an experienced security architect with knowhow in architecture patterns, design patterns, a breadth of technologies, and above all deep security knowledge.

    Join this webinar and learn:

    - Consistency/Reliability: Use of patterns allows us to identify recurring problems/patterns and provide consistently the same solution. In security this means that identifying patterns during threat modeling will allow us to create consistent design, development, testing, and risk guidance.

    - Efficiency: Use of patterns allows us to automate some part of a problem while leaving the more complex concerns to be tackled by experts. This creates efficiencies.

    - Commonly understood taxonomy: Patterns create a common taxonomy for organizing knowledge, training users/practitioners, communicating with stakeholders (developers, testers, architects, security analysts, etc.)
  • Repenser la sécurité
    Repenser la sécurité Yann Samama, Consutlant Solutions de Sécurité Jul 24 2018 8:30 am UTC 45 mins
    Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.

    Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :

    * Augmenter la disponibilité du réseau tout en simplifiant la  connectivité des outils grâce à une solution de module bypass
    * Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés  tout en réduisant la complexité de leur exploitation
    * Diminuer les coûts OPEX et CAPEX via un  ROI très court-termisme

    Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
  • Hacker Powered Cloud Security Testing
    Hacker Powered Cloud Security Testing Andy Condliffe, Solution Architect EMEA, Synack Jul 24 2018 9:00 am UTC 60 mins
    Cloud security has come full circle - back to the user. Early cloud vendors promised complete security only to find the truth more nuanced - there’s a shared responsibility. Both infrastructure and applications in the cloud need attention to stay clear of security vulnerabilities old and cloud new. Security testing has evolved to meet the needs of hybrid, public, and private cloud deployments. Attendees of this webinar can expect to learn:

    The shared model for cloud security
    What cloud providers protect...and what they don’t
    How to migrate securely to the cloud
    What penetration testing for cloud environments does differently
  • How to Deploy Your Service Desk Your Way - Seamlessly, Flexibly and Quickly
    How to Deploy Your Service Desk Your Way - Seamlessly, Flexibly and Quickly Nev Ward and Noel Hopkinson, Senior Solutions Architects Jul 24 2018 10:00 am UTC 60 mins
    While ITSM is often delivered via software as a service (SaaS), businesses today are looking for different deployment options. The world is in flux, and strategies evolve. Businesses using SaaS today may need to migrate to a private cloud in the future. Similarly, some companies have strict security and compliance policies around data sovereignty, making on-premises deployment mandatory. That’s why it’s important to factor deployment flexibility into your evaluation of modern ITSM solutions.

    This webinar will cover:
    1.How Flexible Container Technology provides Portability, Faster Time to Value, and Lower TCO
    2.How seamless upgrades can be achieved in conjunction with Codeless Configuration
    3.How you can now consume new and innovative capabilities with equal speed, whether the solution is on premise, in a SaaS model, or in the public cloud.
  • How to Get the Most Bang for your Buck out of your AppSec Programme
    How to Get the Most Bang for your Buck out of your AppSec Programme John Smith, Snr. Principal Consultant Solutions Architect @ CA Veracode Jul 24 2018 10:00 am UTC 45 mins
    To invest, or not to invest? That is the question. An effective Application Security programme takes a lot of initial investment, particularly of time and effort, not to forget the money.

    In this session, John Smith - Principal Solutions Architect @ CA Veracode - will help you understand how to get the most out of your time, effort and financial investment that has gone into your Application Security Programme.

    You will leave this webinar understanding…

    - Why invest in AppSec?
    - How can you generate the largest ROI on your investment?
    - What positive business outcomes, come from an AppSec Investment?

    Join us on the 24th of July to find out how to get the most bang for your buck with Application Security!
  • Five Key Cloud Migration Success Factors
    Five Key Cloud Migration Success Factors Justin Vaughan-Brown, Director, Technology Strategy, AppDynamics Jul 24 2018 4:00 pm UTC 30 mins
    The more you understand the numerous cloud migration considerations, the more likely your enterprise will take advantage of its scalability, agility, and cost reduction benefits.

    Register for this 30-minute webinar to learn how to minimize the risks and set yourself up for success.

    You’ll also learn:

    - Which applications to migrate first
    - How to monitor and minimize the impact on users before, during, and after
    - What training your IT staff needs to effectively build and operate cloud environments
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Jul 24 2018 5:00 pm UTC 30 mins
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • 2018 Security Congress Preview – Cloud Security
    2018 Security Congress Preview – Cloud Security Mike Brannon, Dir, Infrastructure & Security, Nat'l Gypsum; Eric Fiterman, Consultant, Tyler Smith, IT Analyst, John Deere Jul 24 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Mike Larmie, Federal Solutions Architect, Synack Jul 24 2018 5:00 pm UTC 60 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • How to Drive Your Digital Workplace Forward
    How to Drive Your Digital Workplace Forward Rand Wacker, VP of Product Marketing @ Box and Rafael Perez, Sr. Sales Engineer @ Box Jul 24 2018 6:00 pm UTC 60 mins
    If you are deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.

    Tens of thousands of businesses running Office 365 choose Box over OneDrive and Sharepoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including:

    -Better user experience —users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
    -Better admin experience — more granular controls, more simplified management of all your content
    -Better security — a central platform for consistent security and governance
    -Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
  • Hear from the Experts: Application Modernization for Government Agencies
    Hear from the Experts: Application Modernization for Government Agencies Jason Corey Sr. Mgr. Emerging Technology - Red Hat, Kartik Mecheri Co-Founder & Chief Architect - Karsun Solutions Jul 24 2018 6:00 pm UTC 45 mins
    Many government agencies struggle to drive change, move beyond legacy applications and modernize. In this IT Roundtable, a panel of experts discusses how government agencies can harness the power of DevOps, microservices, containers, and more to modernize their platforms and improve their operations.
  • Open Source Code - a Blessing or a Curse?
    Open Source Code - a Blessing or a Curse? Andrew Kanikuru - Senior Digital Sales @ Veracode & Nabil Bousselham - Principal Consultant Solutions Architect @ Veracode Jul 25 2018 9:30 am UTC 45 mins
    Join Andrew Kanikuru - Senior Digital Sales @ Veracode & Nabil Bousselham - Principal Consultant Solutions Architect @ Veracode - to discuss how fine the line is between a blessing and a curse in terms of Open Source Code Security.
     
    In the technologically advanced era that we live in, organisations rely on fast software delivery to gain the competitive advantage. Using open source and 3rd party components in the SDLC can help companies be first to market with new services and solutions. When you consider that almost 93% of organisations use external snippets of code during development, not only is this now the norm but it is fast becoming best practice.
     
    But what about the risks?
     
    Although using Open Source code allows fast deployment, faster doesn’t always mean better. As the origin of the code is unknown it means it is unsecure. The largest data breach in history occurred due to an exploitation in Open Source Code, leading to huge financial payouts.
     
    Fast & Secure -  how does an organisation juggle these positive outcomes to best enable themselves to get to market quickly and safely?
     
    Join our live webinar on the 25th of July to find out how.
  • Tackling and Eliminating Technical Debt
    Tackling and Eliminating Technical Debt Devin Bernosky, Lead Solutions Engineer Jul 25 2018 4:00 pm UTC 30 mins
    Legacy applications, disparate platforms and processes, and outdated technology have caused organizations to amass technical debt that’s dragging down modernization initiatives. According to Forrester Research, maintaining older applications and technology typically consumes 70% or more of the technology budget – and ignoring it drags down modernization efforts.

    In this webinar, we explore ways to reduce technical debt and how you can use DNS as a shortcut to eliminating decades of technical debt in your organization.
  • Reviewing Spectre 6 Months Later
    Reviewing Spectre 6 Months Later Taylor Armerding, Senior Security Strategist for Synopsys Jul 25 2018 4:00 pm UTC 30 mins
    It’s been more than six months since the major design flaw in computer chips labeled Spectre became public. And, as predicted, it is still haunting the world of information technology. The CPU (central processing unit) is, after all, the “brain” of any computer, phone, tablet, modern TV, or other “smart” device.
    Since then, we’ve all learned a bit about terms some of us had never heard before—“speculative execution,” anyone? We’ve also been told that you can’t just patch a chip the way you can patch bugs in software. But you can create work-arounds with software patches.
    In this webinar, Taylor Armerding, senior security strategist for Synopsys Software Integrity Group, will address some of the questions that “regular”—i.e., nontechnical—users may have about Spectre:
    - What is it?
    - How does it work?
    - Why does it work?
    - Why didn’t chip makers catch a flaw of this magnitude during the design phase?
    - Why is a tool called static analysis the best way to work around Spectre without causing intolerable performance slowdowns?
  • TechTALK: Chatbots - More Accessible (and Powerful) Than Ever Before
    TechTALK: Chatbots - More Accessible (and Powerful) Than Ever Before Simon Jones, CMO, PubNub Jul 25 2018 5:00 pm UTC 45 mins
    The latest trend dominating the chat space is chatbots: artificial intelligence-driven systems that can have natural language conversations with humans despite being no more than code—and whose capabilities continue to grow.
    And the good news is, they’re easier to integrate than ever before. How come? Powerful cognitive services, delivered through accessible APIs.
    In this webinar, we’ll walk you through the chatbot economy, and show you how to low-friction implementation is for your business. We’ll also share the benefits of chatbots for your engagement, and your bottom line.
  • Top 3 steps to accelerate and improve your Continuous Delivery Pipeline Flow
    Top 3 steps to accelerate and improve your Continuous Delivery Pipeline Flow Mark Levy, DevOps Product Marketing Mgr and Julian Fish, Director, Product Manager for Application Lifecycle solutions Jul 25 2018 5:00 pm UTC 60 mins
    DevOps accelerates more than application delivery. It transforms business ideas into customer value by automating and orchestrating continuous delivery pipelines, to securely deliver quality software and services faster. Teams are often spread across the globe supporting both traditional and hybrid IT environments. How do you streamline the delivery pipeline while ensuring collaboration? Join us to hear ways to successfully improve your delivery pipelines across large enterprise organizations, from our experts Julian Fish and Mark Levy.

    This webinar will cover how to:
    • Map and manage value streams
    • Address common constraints in the delivery pipeline flow
    • Accelerate and improve the delivery pipeline flow across the entire value stream
  • Targeted Defense: The Future of Defending Applications in Production
    Targeted Defense: The Future of Defending Applications in Production Mahesh Babu, General manager, Runtime Protection, at Contrast Security Jul 25 2018 5:00 pm UTC 60 mins
    Raise your hand if this is you:

    - Our development teams have a massive security backlog and can’t fix everything in code
    - We need to protect legacy applications with no build pipeline or no dev team support them
    - Struts 2 made us realize we need better production controls and faster zero-day response
    - Our SOC has alert fatigue and has no visibility or context regarding production applications
    - RASP is interesting technology – we are curious to see how we would use it

    At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.

    Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:

    - Intelligent, multi-technique detection
    - Advanced attack response that goes beyond monitoring and blocking
    - Language agnostic protection
    - Simple deployment
  • Managing Hybrid Clouds like a Pro
    Managing Hybrid Clouds like a Pro Dan Waymire, Senior Manager of Unified Cloud at Hosting Jul 25 2018 5:00 pm UTC 60 mins
    Join Hosting’s Dan Waymire, SR. Manager of Unified Cloud, to see first-hand how Hosting can help your organization monitor assets in any environment, all within a single pane of glass.

    Enterprises today are aware of the risks of taking an exclusively public cloud approach. Companies need a holistic cloud strategy spanning deployments in:

    • Private Cloud
    • On-premise
    • Public Cloud

    As IT professionals distribute workloads across various clouds, it is more critical now than ever to manage the performance, availability, and cost of your IT assets.

    In this webinar, you will learn how you can effectively manage all of your environments, as Dan demonstrates the true value of adopting a single-platform monitoring tool.
  • Time-Series in Driverless AI
    Time-Series in Driverless AI Marios Michailidis Jul 25 2018 6:00 pm UTC 45 mins
    Driverless AI is H2O.ai's latest flagship product for automatic machine learning. It fully automates some of the most challenging and productive tasks in applied data science such as feature engineering, model tuning, model ensembling and model deployment. Driverless AI turns Kaggle-winning grandmaster recipes into production-ready code, and is specifically designed to avoid common mistakes such as under- or overfitting, data leakage or improper model validation, some of the hardest challenges in data science. Avoiding these pitfalls alone can save weeks or more for each model, and is necessary to achieve high modeling accuracy.

    Driverless AI is now equipped with time-series functionality. Time series helps forecast sales, predict industrial machine failure and more. With the time series capability in Driverless AI, H2O.ai directly addresses some of the most pressing concerns of organizations across industries for use cases such as transactional data in capital markets, in retail to track in-store and online sales, and in manufacturing with sensor data to improve supply chain or predictive maintenance.
  • Anticipa la seguridad de las aplicaciones con el análisis estático CA Veracode
    Anticipa la seguridad de las aplicaciones con el análisis estático CA Veracode Antonio Reche - Snr. Principal Consultant Solutions Architect @ Veracode Jul 26 2018 9:00 am UTC 45 mins
    Le invitamos a que nos acompañe a conocer cómo CA Veracode puede ayudarle de manera efectiva en el ciclo de vida del desarrollo de software. En esta sesión Antonio Reche - arquitecto consultor en soluciones en Veracode- le mostrará como formar de manera rápida a los desarrolladores para que identifiquen y corrijan defectos de código relacionados con la seguridad sin necesidad de gestionar alguna herramienta.

    La tecnología de análisis estático patentada por Veracode examina los principales frameworks y lenguajes sin necesidad del código fuente; por lo que puede evaluar el código que escribe, compra o descarga así como medir el progreso desde una única plataforma SaaS.

    Después de esta sesión usted conocerá las mejore prácticas para:

    • Integración del análisis estático en su proceso de desarrollo
    • Cumplir con las políticas de seguridad internas y externas
    • Crear políticas para su programa de seguridad de aplicaciones
    • Evaluar código contra política antes del check-in
    • Análisis de resultados y generación de informes (visor de fallos de seguridad)
    • Definición de roles de usuario y vistas de equipo dentro de la plataforma
  • Industrial IoT: What is Missing and What is Next?
    Industrial IoT: What is Missing and What is Next? Ian Hughes, Senior Analyst IoT, and Emily Wentworth, Research Associate Jul 26 2018 3:00 pm UTC 60 mins
    451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.

    During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.

    The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
  • How Government Agencies are Serving Citizens Better in the Cloud
    How Government Agencies are Serving Citizens Better in the Cloud Sonny Hashmi, Manager Director and former CIO of US GSA @ Box and Dan Ault, CIO of Town of Cary, North Carolina Jul 26 2018 3:00 pm UTC 60 mins
    A sea of change is happening across city, state and federal governments. Government visionaries and IT leaders are looking for ways to move beyond limiting, legacy technologies and embrace Cloud Content Management as a modern way to provide services and solutions to citizens.

    Content is at the heart of digital citizen services, whether its managing video and photographic evidence, to collaborating on the right situational awareness, to telemetry and maps, agencies rely on unstructured data every day to delivery their missions - all while providing compliance for standards such as FedRAMP, ITAR, DoD SRG L4 and IRS-1075.

    Dan Ault, CIO of the Town of Cary, North Carolina, will describe how he's leading the wholesale modernization of that city with cloud services built on Box, alongside other modern, cloud technologies. Box's Managing Director, and Former CIO of US GSA, Sonny Hashmi will also share how government agencies are building new IT stacks to deliver powerful, scalable public services.
  • How to Containerize Java Spring Applications using Docker
    How to Containerize Java Spring Applications using Docker Mike Zazon, Cloud Systems Developer Lead, Cloudreach Jul 26 2018 3:00 pm UTC 60 mins
    So you want to containerize your Java Spring application? Great idea!

    Java is continuing to evolve and closer integration with Docker is one of the recent benefits of the latest releases! Docker provides a lot of great constructs and mechanisms to take applications all the way from development to production. Simplifying development activities and managing dependencies is one of the biggest advantages! There are a lot of great tricks and best practices that will make your life easier as you start to get your hands dirty with Docker, so join Mike Zazon, Cloud Systems Developer Lead at Cloudreach, as looks at some of those tricks and best practices and go through some examples that will help you along your journey to containerizing your Java Spring applications!
  • Illustrating the Systemic Risk Caused by Open Source Library Use
    Illustrating the Systemic Risk Caused by Open Source Library Use Tim Jarrett, Senior Director of Enterprise Security Strategy, CA Veracode Jul 26 2018 5:00 pm UTC 45 mins
    How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.

    Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
  • Best practices for Forensics and Incident Response in Containers
    Best practices for Forensics and Incident Response in Containers Knox Anderson Jul 26 2018 5:00 pm UTC 30 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool