Enviar pesquisa
Carregar
Cisco
•
1 gostou
•
4,695 visualizações
C
Cisco Systems
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 1
Baixar agora
Baixar para ler offline
Recomendados
Slides show the first ceph dashboard integrated within Openstack (Horizon) and how to optimize ceph performance!
Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph Story
Debojyoti Dutta
Certificate_Masters_nlucero
Certificate_Masters_nlucero
nlucero9
SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1
Safwat Ramadan
Bill Martino from CheckPoint presents ten steps to a more secure business.
Bill checkpoint
Bill checkpoint
Billy Cox
The Security Kung Fu Series was created as both a thought leadership and awareness campaign which ran from Q1 – Q2 2017. It was meant to educate attendees on the internal and external threats businesses face, and the compliance challenges many must endure. It also served to highlight the need for an array of software solutions from the SolarWinds Core IT Security Portfolio which can assist with these concerns. A primary focus of the event was SolarWinds® Log & Event Manager which can contribute to greater IT security and assist businesses in meeting and maintaining compliance with a variety of compliance regimes. Part 4: Security vs. Compliance As our repeat attendees found out, for many of these webcasts we spent at least a small portion of time discussing how each topic we covered transcends the goal of improving IT security to impact compliance as well. In this session, we took a deeper look at what is driving this point and discussed the “Two Schools of Thought” which are guiding IT decision making – Security vs. Compliance. If you are interested in learning about the impact of this campaign, please visit my LinkedIn Profile for more details or feel free to reach out to me directly over LinkedIn. Other Security Kung Fu Events: Part 1: SIEM Solutions | http://bit.ly/2qkwVWh Part 2: Firewall Logs | http://bit.ly/2ql3l2A Part 3: Active Directory Changes | http://bit.ly/2s5kFFc Acknowledgements I’d like to thank the following individuals for assisting me in the execution of this campaign: Justina Lister, Angeline Kelly, Jamie Hynds, Ian Trump, Destiny Bertucci, Curtis Ingram, Chris Wiley, Ren Penaflor, Allie Eby, Ann Guidry, Rainy Schermerhorn, Kirsten Tanges, Damon Garcia
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
Joshua Berman
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
Remote
Fiddler
Fiddler
Jineesh John
This slide is prepared for OpenStack Mitaka Swift Design Summit
RBAC in Swift
RBAC in Swift
HisashiOsanai
Recomendados
Slides show the first ceph dashboard integrated within Openstack (Horizon) and how to optimize ceph performance!
Storage Visibility for Operations - A Ceph Story
Storage Visibility for Operations - A Ceph Story
Debojyoti Dutta
Certificate_Masters_nlucero
Certificate_Masters_nlucero
nlucero9
SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1
Safwat Ramadan
Bill Martino from CheckPoint presents ten steps to a more secure business.
Bill checkpoint
Bill checkpoint
Billy Cox
The Security Kung Fu Series was created as both a thought leadership and awareness campaign which ran from Q1 – Q2 2017. It was meant to educate attendees on the internal and external threats businesses face, and the compliance challenges many must endure. It also served to highlight the need for an array of software solutions from the SolarWinds Core IT Security Portfolio which can assist with these concerns. A primary focus of the event was SolarWinds® Log & Event Manager which can contribute to greater IT security and assist businesses in meeting and maintaining compliance with a variety of compliance regimes. Part 4: Security vs. Compliance As our repeat attendees found out, for many of these webcasts we spent at least a small portion of time discussing how each topic we covered transcends the goal of improving IT security to impact compliance as well. In this session, we took a deeper look at what is driving this point and discussed the “Two Schools of Thought” which are guiding IT decision making – Security vs. Compliance. If you are interested in learning about the impact of this campaign, please visit my LinkedIn Profile for more details or feel free to reach out to me directly over LinkedIn. Other Security Kung Fu Events: Part 1: SIEM Solutions | http://bit.ly/2qkwVWh Part 2: Firewall Logs | http://bit.ly/2ql3l2A Part 3: Active Directory Changes | http://bit.ly/2s5kFFc Acknowledgements I’d like to thank the following individuals for assisting me in the execution of this campaign: Justina Lister, Angeline Kelly, Jamie Hynds, Ian Trump, Destiny Bertucci, Curtis Ingram, Chris Wiley, Ren Penaflor, Allie Eby, Ann Guidry, Rainy Schermerhorn, Kirsten Tanges, Damon Garcia
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
Joshua Berman
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
Remote
Fiddler
Fiddler
Jineesh John
This slide is prepared for OpenStack Mitaka Swift Design Summit
RBAC in Swift
RBAC in Swift
HisashiOsanai
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Canada
Cisco SourceFire
Cisco SourceFire
Ahmed Serag
In this webcast, we discuss how adopting certain IT security stances, including those using log management and SIEM (Security Information and Event Management) solutions, can help you combat evolving cybersecurity threats and maintain regulatory compliance.
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
SolarWinds
The Security Kung Fu Series was created as both a thought leadership and awareness campaign which ran from Q1 – Q2 2017. It was meant to educate attendees on the internal and external threats businesses face, and the compliance challenges many must endure. It also served to highlight the need for an array of software solutions from the SolarWinds Core IT Security Portfolio which can assist with these concerns. A primary focus of the event was SolarWinds® Log & Event Manager which can contribute to greater IT security and assist businesses in meeting and maintaining compliance with a variety of compliance regimes. Part 2: Firewall Logs Part 2 of the series shifted our attention to the periphery of a network to focus on how firewalls serve as a first line of defense against security threats. In addition to discussing the patterns of attack which have been demonstrated countless times by hackers, we showed how firewall log data can give notice of attempts at infiltrating a network, exfiltrating data, and more. Beyond that, we discussed how Network Change and Configuration Management solutions can too contribute to deeper IT security by helping to alert to config. changes on firewalls - and other network devices - in addition to a host of other capabilities which can help with this cause. Other Security Kung Fu Events: Part 1: SIEM Solutions | http://bit.ly/2qkwVWh Part 3: Active Directory Changes | http://bit.ly/2s5kFFc Part 4: Security vs. Compliance | http://bit.ly/2qXuc3I If you are interested in learning about the impact of this campaign, please visit my LinkedIn Profile for more details or feel free to reach out to me directly over LinkedIn. Acknowledgements I’d like to thank the following individuals for assisting me in the execution of this campaign: Justina Lister, Angeline Kelly, Jamie Hynds, Ian Trump, Destiny Bertucci, Curtis Ingram, Chris Wiley, Ren Penaflor, Allie Eby, Ann Guidry, Rainy Schermerhorn, Kirsten Tanges, Damon Garcia
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
Joshua Berman
CiscoCertificate
CiscoCertificate
kevin Chendjou
"SeVR+" was presented at the 25th Iranian conference on Electrical Engineering on May 2-4, 2017. Our paper addressed the secure issues related to a video reporting service in 5G enabled vehicular networks. we refer interested readers to http://ieeexplore.ieee.org/abstract/document/7985418/
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
mohseniatefeh
Palestra apresentada no BsidesSP ed 12
Segurança da era do ssl everywhere
Segurança da era do ssl everywhere
rodolfovillordo
Presentation material from the Cloud Security Alliance, Austin Chapter meeting held on February 2, 2012.
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Glen Roberts, CISSP
Cisco Connect 2018 Malaysia
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
The polls are closed, votes are in, and we have ten winners making up the Top Ten Web Hacks of 2007! The competition was fierce. The information security community put 80 of the newest and most innovative Web hacking techniques to the test. The voting process saw even some attempts at ballot stuffing, but to no avail, and very few techniques received zero votes. The winners though stood head and shoulders above the rest. Thanks to everyone who helped building the list of links, took the time to vote, and especially the researchers whose work we all rely upon. Congratulations! http://jeremiahgrossman.blogspot.com/2008/01/top-ten-web-hacks-of-2007-official.html
Top Ten Hacks of 2007
Top Ten Hacks of 2007
Jeremiah Grossman
Intervento tenuto assieme a SonicWAll per analizzare eventuali rischi presenti nelle reti moderne grazie alle tecnologie più utilizzate, e come mitigarle.
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
Alessio Pennasilico
Iterative and-agile-codegen
Iterative and-agile-codegen
Mickael Istria
Some news of GMF Tooling. Presented during Modeling Symposium @EclipseCon 2012
What's up GMF Tooling?
What's up GMF Tooling?
Mickael Istria
A apresentação deste estudo de caso ocorreu no dia 08 de novembro de 2016 no Salão de Atos da UFRGS em Porto Alegre na 82ª edição nacional do evento BPM Day da ABPMP Brasil. O evento contou com a presença de um público de mais de 550 pessoas e teve como objetivo discutir o tema Gerenciamento de Processos de Negócio (BPM - Business Process Management) e apresentar casos práticos de implementação.
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Mauricio Bitencourt, CBPP
EclipseCon 2012 slides from Xavier Seignard ( http://twitter.com/xavier_seignard ) and Mickael Istria http://www.eclipsecon.org/2012/sessions/get-ready-fight-your-technical-debt-tycho-sonar-and-jacoco
Fight your technical debt with Jenkins, Jacoco and Sonar
Fight your technical debt with Jenkins, Jacoco and Sonar
Mickael Istria
TDS - USC Q4 2016 operating results final
TDS - USC Q4 2016 operating results final
TDS - USC Q4 2016 operating results final
TelephoneDataSystems
Estive no 103º Fórum Nacional de Secretários de Estado da Administração e II Seminário de Gestão por Processos na Administração Pública do Estado de Goiás para palestrar sobre Transformação Digital e Melhoria de Processos, Casos e Decisões. O evento contou com a presença de Secretários de Administração e Gestão de 16 estados e mais de 300 pessoas para assistir as palestras do seminário, trocar experiências e ampliar networking. Aproveitei o convite para o evento em Goiânia para fazer o lançamento da Guia de Referência para Modelar Processos, Casos e Decisões com BPMN, CMMN e DMN. Saiba mais: http://mauriciobitencourt.com/eventos/103o-forum-consad/ http://mauriciobitencourt.com/teorias/guia-de-referencia-bpmn-cmmn-dmn/ http://www.projeler.com.br/ec/
Transformação Digital e Melhoria de Processos, Casos e Decisões
Transformação Digital e Melhoria de Processos, Casos e Decisões
Mauricio Bitencourt, CBPP
Thinking about your sales team's goals for 2017? Drift's VP of Sales shares 3 things you can do to improve conversion rates and drive more revenue. Read the full story on the Drift blog here: http://blog.drift.com/sales-team-tips
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
Mais conteúdo relacionado
Mais procurados
Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are creating significant opportunities for global organizations. With these environmental changes, the sophistication with which cyber threats and attacks are carried out continues to grow rapidly, and attackers are increasingly able to circumvent traditional security systems. To learn more, please visit our website here: http://www.cisco.com/web/CA/index.html
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Canada
Cisco SourceFire
Cisco SourceFire
Ahmed Serag
In this webcast, we discuss how adopting certain IT security stances, including those using log management and SIEM (Security Information and Event Management) solutions, can help you combat evolving cybersecurity threats and maintain regulatory compliance.
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
SolarWinds
The Security Kung Fu Series was created as both a thought leadership and awareness campaign which ran from Q1 – Q2 2017. It was meant to educate attendees on the internal and external threats businesses face, and the compliance challenges many must endure. It also served to highlight the need for an array of software solutions from the SolarWinds Core IT Security Portfolio which can assist with these concerns. A primary focus of the event was SolarWinds® Log & Event Manager which can contribute to greater IT security and assist businesses in meeting and maintaining compliance with a variety of compliance regimes. Part 2: Firewall Logs Part 2 of the series shifted our attention to the periphery of a network to focus on how firewalls serve as a first line of defense against security threats. In addition to discussing the patterns of attack which have been demonstrated countless times by hackers, we showed how firewall log data can give notice of attempts at infiltrating a network, exfiltrating data, and more. Beyond that, we discussed how Network Change and Configuration Management solutions can too contribute to deeper IT security by helping to alert to config. changes on firewalls - and other network devices - in addition to a host of other capabilities which can help with this cause. Other Security Kung Fu Events: Part 1: SIEM Solutions | http://bit.ly/2qkwVWh Part 3: Active Directory Changes | http://bit.ly/2s5kFFc Part 4: Security vs. Compliance | http://bit.ly/2qXuc3I If you are interested in learning about the impact of this campaign, please visit my LinkedIn Profile for more details or feel free to reach out to me directly over LinkedIn. Acknowledgements I’d like to thank the following individuals for assisting me in the execution of this campaign: Justina Lister, Angeline Kelly, Jamie Hynds, Ian Trump, Destiny Bertucci, Curtis Ingram, Chris Wiley, Ren Penaflor, Allie Eby, Ann Guidry, Rainy Schermerhorn, Kirsten Tanges, Damon Garcia
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
Joshua Berman
CiscoCertificate
CiscoCertificate
kevin Chendjou
"SeVR+" was presented at the 25th Iranian conference on Electrical Engineering on May 2-4, 2017. Our paper addressed the secure issues related to a video reporting service in 5G enabled vehicular networks. we refer interested readers to http://ieeexplore.ieee.org/abstract/document/7985418/
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
mohseniatefeh
Palestra apresentada no BsidesSP ed 12
Segurança da era do ssl everywhere
Segurança da era do ssl everywhere
rodolfovillordo
Presentation material from the Cloud Security Alliance, Austin Chapter meeting held on February 2, 2012.
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Glen Roberts, CISSP
Cisco Connect 2018 Malaysia
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
The polls are closed, votes are in, and we have ten winners making up the Top Ten Web Hacks of 2007! The competition was fierce. The information security community put 80 of the newest and most innovative Web hacking techniques to the test. The voting process saw even some attempts at ballot stuffing, but to no avail, and very few techniques received zero votes. The winners though stood head and shoulders above the rest. Thanks to everyone who helped building the list of links, took the time to vote, and especially the researchers whose work we all rely upon. Congratulations! http://jeremiahgrossman.blogspot.com/2008/01/top-ten-web-hacks-of-2007-official.html
Top Ten Hacks of 2007
Top Ten Hacks of 2007
Jeremiah Grossman
Intervento tenuto assieme a SonicWAll per analizzare eventuali rischi presenti nelle reti moderne grazie alle tecnologie più utilizzate, e come mitigarle.
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
Alessio Pennasilico
Mais procurados
(11)
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco SourceFire
Cisco SourceFire
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
CiscoCertificate
CiscoCertificate
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
SeVR+ :Secure and Privacy-Aware Cloud-Asisted Video Reporting Service for 5G ...
Segurança da era do ssl everywhere
Segurança da era do ssl everywhere
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Cloud Security Alliance, Austin Chapter Meeting 2012-02-02
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Top Ten Hacks of 2007
Top Ten Hacks of 2007
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
Destaque
Iterative and-agile-codegen
Iterative and-agile-codegen
Mickael Istria
Some news of GMF Tooling. Presented during Modeling Symposium @EclipseCon 2012
What's up GMF Tooling?
What's up GMF Tooling?
Mickael Istria
A apresentação deste estudo de caso ocorreu no dia 08 de novembro de 2016 no Salão de Atos da UFRGS em Porto Alegre na 82ª edição nacional do evento BPM Day da ABPMP Brasil. O evento contou com a presença de um público de mais de 550 pessoas e teve como objetivo discutir o tema Gerenciamento de Processos de Negócio (BPM - Business Process Management) e apresentar casos práticos de implementação.
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Mauricio Bitencourt, CBPP
EclipseCon 2012 slides from Xavier Seignard ( http://twitter.com/xavier_seignard ) and Mickael Istria http://www.eclipsecon.org/2012/sessions/get-ready-fight-your-technical-debt-tycho-sonar-and-jacoco
Fight your technical debt with Jenkins, Jacoco and Sonar
Fight your technical debt with Jenkins, Jacoco and Sonar
Mickael Istria
TDS - USC Q4 2016 operating results final
TDS - USC Q4 2016 operating results final
TDS - USC Q4 2016 operating results final
TelephoneDataSystems
Estive no 103º Fórum Nacional de Secretários de Estado da Administração e II Seminário de Gestão por Processos na Administração Pública do Estado de Goiás para palestrar sobre Transformação Digital e Melhoria de Processos, Casos e Decisões. O evento contou com a presença de Secretários de Administração e Gestão de 16 estados e mais de 300 pessoas para assistir as palestras do seminário, trocar experiências e ampliar networking. Aproveitei o convite para o evento em Goiânia para fazer o lançamento da Guia de Referência para Modelar Processos, Casos e Decisões com BPMN, CMMN e DMN. Saiba mais: http://mauriciobitencourt.com/eventos/103o-forum-consad/ http://mauriciobitencourt.com/teorias/guia-de-referencia-bpmn-cmmn-dmn/ http://www.projeler.com.br/ec/
Transformação Digital e Melhoria de Processos, Casos e Decisões
Transformação Digital e Melhoria de Processos, Casos e Decisões
Mauricio Bitencourt, CBPP
Thinking about your sales team's goals for 2017? Drift's VP of Sales shares 3 things you can do to improve conversion rates and drive more revenue. Read the full story on the Drift blog here: http://blog.drift.com/sales-team-tips
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
Destaque
(8)
Iterative and-agile-codegen
Iterative and-agile-codegen
What's up GMF Tooling?
What's up GMF Tooling?
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Transformação Digital da Gestão de Crédito - Apresentação da Fundacred no BPM...
Fight your technical debt with Jenkins, Jacoco and Sonar
Fight your technical debt with Jenkins, Jacoco and Sonar
TDS - USC Q4 2016 operating results final
TDS - USC Q4 2016 operating results final
Transformação Digital e Melhoria de Processos, Casos e Decisões
Transformação Digital e Melhoria de Processos, Casos e Decisões
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Cisco
1.
www.slideshare.net/CISCO © 2013 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 1
Baixar agora