Detecting anomalous network patterns

SRE for data security and observability

Tickets available

Sales closed

Get tickets
Tickets

Loading…

Can we detect a data breach by monitoring egress traffic? Large data breach incidents between December 2019 and March 2020 have revealed that poor monitoring of networks and egress traffic is a glaring gap in CloudOps and SRE workflows.

The experiential case studies will help participants build better data security systems by tightening monitoring and observability workflows.

The target audience for this series includes:

  1. SRE who work with Cloud.
  2. Observability geeks.
  3. CloudOps engineers.
  4. Cloud architects.
  5. Network security engineers.

Submit your case study for this series on https://hasgeek.com/rootconf/detecting-anomalous-network-patterns/sub

Contact information: Join the Rootconf Telegram group on https://t.me/rootconf or follow @rootconf on Twitter.
For inquiries, contact Rootconf on rootconf.editorial@hasgeek.com or call 7676332020.

Can we detect a data breach by monitoring egress traffic? Large data breach incidents between December 2019 and March 2020 have revealed that poor monitoring of networks and egress traffic is a glaring gap in CloudOps and SRE workflows.

The experiential case studies will help participants build better data security systems by tightening monitoring and observability workflows.

The target audience for this series includes:

  1. SRE who work with Cloud.
  2. Observability geeks.
  3. CloudOps engineers.
  4. Cloud architects.
  5. Network security engineers.

Submit your case study for this series on https://hasgeek.com/rootconf/detecting-anomalous-network-patterns/sub

Contact information: Join the Rootconf Telegram group on https://t.me/rootconf or follow @rootconf on Twitter.
For inquiries, contact Rootconf on rootconf.editorial@hasgeek.com or call 7676332020.

Tickets available

Sales closed

Get tickets

Hosted by

Rootconf is a forum for discussions about DevOps, infrastructure management, IT operations, systems engineering, SRE and security (from infrastructure defence perspective).more