Why DNS Automation is Amazing

Pre-Recorded Session


Live Q&A

Friday, June 4th, 11:00 – 11:30 am


Description

API enabling your DNS server will let you do awesome things! See why having API access to DNS for all necessary parties enables automation on a level we’ve only previously dreamed about. We were manually doing certificate renewal for 1800+ certs, but after implementing Infoblox API + AWS Cert Manager + Wiscweb we have 1800+ Automatically renewed SSL Certificates FTW. And this pattern can be used by anyone! This session is perfect for people who have or host websites, or run DNS servers.


Presenter Information

Interop Update – What’s Here, and What’s Coming

Pre-Recorded Session


Live Q&A

Friday, June 4th, 1:30 – 2:00 pm


Description

Get an update on the Interop Initiative including new infrastructure services and capabilities, and plans for the coming year. Learn about the new tools and approaches that are coming online, and how they impact data access and integration.


Presenter Information

Monitoring UW Network Ports (Flash Talk)

Pre-Recorded Session


Live Q&A

Friday, June 4th, 2:30 – 3:00 pm

Note: Unfortunately part of this Live Q&A was not recorded. We apologize for the mistake.


Description

This presentation will show how to use existing UW metric backends in your own custom monitoring system. Participants will learn how to use existing data to monitor any UW network port.

Audience needs a general knowledge of metrics and monitoring.


Presenter Information

Ransomware – How it Works and How to Stop it

Pre-Recorded Session


Live Q&A

Friday, June 4th, 8:45 – 9:15 am


Description

Learn how to respond to a ransomware threat proactively, ideally to prevent an attack, or to have the resources to recover if one occurs. Looking beyond the infamous components of an extortion attack – data encryption and demands for ransom – this will cover the most common methods for gaining access, use of lateral movement and privilege escalation, and how an attacker uses fear to increase the chance of getting payment. I will focus on prevention, ideally to stop the attacker from gain access by following best practices in IT security. Logging and monitoring can detect an attack before data is encrypted, although that may not prevent data exfiltration. Effective backup strategy, having backups offline and keeping them long enough that there will be a backup from before the initial compromise, is essential to recovery.


Presenter Information