The modern approach to delivering IT solutions for an enterprise starts with a hybrid cloud, security centric approach. Everything IT is being becoming software-defined, a.k.a. “IT-as-Code”. This requires enterprise security and ops teams to know how to connect together APIs, deploy cloud infrastructure, use automation tools, and adopt DevSecOps methodologies for delivering modern IT solutions to their stakeholders. Finding nirvana in the modern enterprise world requires this missing link: repeatable, secure IT-as-Code solution blueprints that can be agile, iterated on, and adapted to ongoing business and compliance requirements. In this session you will learn how to build a secure IT solution blueprint using AWS and Azure cloud native templates (IaaS & PaaS) combined with Red Hat Ansible for configuration management (Legacy apps & SaaS), and how to tie into external APIs. We will then discuss best practices for applying cloud security controls with every cloud service, automation task and API integration. We will discuss using open source security tools, e.g. Chef Inspec for automating compliance requirements and securit and security remediation. To wrap up the session, we will go over the entire lifecycle of solution delivery adding in to the blueprints, with cloud services and other API integrations connect everything together to show own to intelligently deliver end-to-end solution blueprints and how to manage the configuration of the state of the environment over time.

Hora

19:00 - 20:00 hs GMT+1

Organizador

Cloud Computing
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 849 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020