CyberOZ learning primer provides a learning roadmap for individuals, enterprises and operators getting started on their network transformation journey.
Session 1 - 9AM to 12PM
Cloud-Native Application Security Considerations
Presentation Outline:
Cloud-Native technologies and tools such as Microservices, Containers, and Kubernetes have emerged as the major virtualization approaches. Package these cloud native microservices to create, deploy and manage for both on-prem and cloud environments. Cloud-Native technologies bring a wealth of benefits; however, the task of securing your cloud-native environment is challenging.
This Cloud-Native security considerations presentation deals with a practical view of Kubernetes security, and vulnerability management tools to improve cloud native infrastructure security.
This overview defines a model for thinking about Kubernetes security in the context of Cloud Native Security with 4Cs (Cloud, Cluster, Container, and Code). Each layer of the Cloud Native security model builds upon the next outermost layer. The Code layer benefits from strong base (Cloud, Cluster, Container) security layers and so on.
This presentation intends to provide organizations and their technical leadership with a clear understanding of cloud native security, its incorporation in their lifecycle processes, and considerations for determining the most appropriate application thereof.
The following objectives will be covered:
Prerequisites:
Session 2 - 1PM to 4PM
Establishing a IPv6 Cybersecurity Defense Architecture
Presentation Outline:
A 3 hour practical course on establishing and maintaining an IPv6 Cybersecurity Defense in Depth architecture for small, medium and large private and public enterprises.
The course will contain US Government aspects of both US Civilian and Department of Defense architecture elements, including but not limited to Continuous Diagnostic and Monitoring (CDM) elements and Trusted Internet Computing (TIC).