January 2020: Introduction to Open Source Software in the Enterprise

Click here to view & download the presentation slides

Presented by Joanna Lee

Attorney at Gesmer Updegrove LLP

Join us for an introduction to use of Open Source (OS) software in the enterprise. We will learn:

  • What is OS software?
  • Benefits and risks of using OS software
  • Types of OS licenses, which licenses are business-friendly, and how they apply to various use cases
  • Basics of OS compliance and risk management in the enterprise
    Tools for automating compliance

Continue reading “January 2020: Introduction to Open Source Software in the Enterprise”

September 4th Happy Hour: Making Data Lakes more Reliable with Apache Spark and Delta Lake

Presented by Tathagata Das, Databricks

Delta Lake is an open-source storage layer that brings reliability to data lakes. Delta Lake offers ACID transactions, scalable metadata handling, and unifies streaming and batch data processing. It runs on top of your existing data lake and is fully compatible with Apache Spark APIs. In this talk, we will cover • All technical aspects of Delta Features • What’s coming • How to get started using it • How to contribute

Continue reading “September 4th Happy Hour: Making Data Lakes more Reliable with Apache Spark and Delta Lake”

September 2019: Recent Advances in Natural Language Processing With (Some) Theory & Applications

Click here to view and download the presentation slides

Presented by Joachim Rahmfeld, Ph.D

Lecturer at UC Berkeley

Today’s vast volumes of language-based, unstructured, electronic data found in various form factors such as blogs, email, social media, or web sites, promises competitive advantages for those who can extract business-relevant information most effectively and efficiently. Natural Language Processing (NLP) holds the key in leveraging this type of data in order to answer and respond to important questions such as, “What is the perception of my company in the Twittersphere?”, “Are these reviews largely positive or negative?”, “What is the translation of this in Spanish?”, “This document has the answer to my question somewhere… but where?”, “Are these products similar?”

Particularly over the last five years, revolutionary advances in NLP-related Deep Learning algorithms combined with dramatically increased compute resources have created unprecedented opportunities to not only answer natural language questions with greater accuracy and speed, but often also while requiring significantly less training data.

In this session, we will provide an overview of these advances and how you can make use of them. A particular focus will be transfer learning where large, pretrained models, such as Google’s BERT model, can be leveraged for a broad set of NLP use cases delivering excellent results, and enabling you to answer questions that were not possible to answer just a few years ago.

So this is a great time to learn about recent NLP developments and go through explicit examples.

Continue reading “September 2019: Recent Advances in Natural Language Processing With (Some) Theory & Applications”

July 2019: Data Management From A Penetration Tester’s Perspective

Click here to download the presentation slides

Presented by John Stephens, CISSP

Managing Partner, Luminant Digital Security

Data Management from a Penetration Tester’s Perspective – Zero Trust and Compliance

It’s pretty much a daily occurrence where we hear some vulnerability or hack or about this or that breach, resulting in information disclosure on what seems increasingly to be hundreds of thousands or millions of records. And if that wasn’t enough, it’s become a regular occurrence where we hear about how some city opted to pay hundreds of thousands of dollars in ransom. Now, we could spend all day talking about all the things that went wrong to get to this point. That could include security patching, application development, system configuration, etc. One item that’s often overlooked is Data Management and its impact on security. In nearly every hack or breach, the ultimate goal of the attacker is to get to the data so it can be monetized. So how you manage the data is critical.

This presentation is designed to give you insight into how attacks are executed, the tools and tricks the attackers use, and how data management can play a role in minimizing the damage when a breach occurs, or perhaps stopping it altogether. This effort can be significantly enhanced by adopting a zero trust approach with data access and backups. It can be significantly hindered by checklist “compliance” efforts that are not grounded in secure best practices. We’ll talk about these items based on observations and experience during actual Penetration Tests, so you can hear firsthand how data management can play a role in securing your data.

Continue reading “July 2019: Data Management From A Penetration Tester’s Perspective”