apius-logo
upper-burgerbottom-burger
Apius
events
Knowledge that inspires - we invite you to exchange experiences and education.
01.
Apius events

Ladies and gentlemen,


we listen carefully to what our customers say and we try to satisfy your opinions, remarks and especially needs. That is why we are starting the implementation of the idea of ​​sharing our expert knowledge - we start with a series of meetings entitled "Knowledge that inspires - especially in times of crisis".

At the beginning, we have prepared 4 meetings of various forms (workshops, life shows, presentations, etc.). They will always be practice-oriented and conducted by experts. Details of the next ones soon.

We invite you to a common space with full-fledged and up-to-date knowledge of cybersecurity. We want to create not only a place for gaining knowledge, but also for checking it or building a community that substantively supports its participants.


Łukasz Kułacz,
CEO of Apius Technologies SA

show description

show description
03.
Archival events

REGISTRATION CLOSED

Prisma Cloud - Public cloud and container environments under control
show description
DATE:  25.02.2021

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATE: 25.02.2021
HOURS: 12:00-14:40
add to calendar

"Yes, our company uses cloud solutions." - How to understand such a statement? Does it mean that the company uses applications served in the SaaS model? Maybe the point is that the company uses IaaS or PaaS services provided by a public cloud provider such as AWS or Azure? Or maybe it creates its applications based on serverless class technologies, e.g. Fargate or AWS Lambda? Or is it about using containers under the control of some variety of Kubernetes orchestrator?

The cloud has many forms and the answer to this question will be different for each company or institution. The variety and complexity of this class of environments is a factor that significantly hinders their effective protection. For this reason, as part of our webinar, we will show how to ensure a consistent, single point of supervision over the security of various cloud environments. You will learn, among other things, how:

  • provide visibility over the state of public cloud configuration,
  • reagować na zdarzenia związane ze zmianą stanu chmury,
  • observe network flows of cloud environments,
  • provide effective breach notification mechanisms,
  • implement good practices and ensure the continuous compliance of the environment configuration with legal regulations and corporate requirements,
  • effectively manage vulnerabilities,
  • protect the network layer of container environments,
  • supervise containers and hosting virtual machines from the inside,
  • conduct an analysis after the break-in,
  • safely distribute application secrets,
  • weave security from the beginning of the manufacturing process until the production launch

    using Prisma Cloud and Prisma Cloud Compute. Our webinar will consist of a presentation combined with a demonstration of the individual functions of Prisma.
Speakers
Przemysław Gręda
Apius Technologies SA
Network solutions and IT security consultant and IT project manager. He focuses on technologies related to network security. He has many years of experience in managing and implementing projects in the public, banking, industrial and insurance sectors.
Ewa Śniechowska
Palo Alto Networks
Ewa Śniechowska is responsible at Palo Alto Networks for supporting customers from the Eastern Europe region in securing applications operating within public and private clouds. She gained her experience working as a sales support engineer and product manager, leading implementation projects in the field of network and security, and as a system engineer at Palo Alto Networks and VMware.
The meeting is dedicated to:
Cloud DevOps/SecOps/SysOps
You will learn how to protect the environments you work with on a daily basis. You will see how to catch errors in currently used cloud services. You will get tips on how to integrate security into the CI / CD pipeline to minimize risks before the application goes to production. You touch the problem of post-hack analysis.
Security experts / Administrators / Network specialists
If you are at the beginning of your journey towards the cloud, you will find out where to get the best practices in the field of cloud services configuration. You will see a tool that consistently collects, analyzes and presents information that is scattered in many places and usually completely unreadable. You will see how to quickly and effectively secure cloud environments.
The participant receives:
benefit-icon
Access to valuable knowledge about the security of cloud environments.
benefit-icon
Possibility to take advantage of a 30-minute free expert consultation
Partners

REGISTRATION CLOSED

Well-connected containers - security, scalability and reliable communication of Kubernetes clusters
show description

DATE:  24.11.2020

REGISTRATION CLOSED

show description
General information

number of seats: 23/50

PLACE: On-line
DATA: 24.11.2020
HOURS: 12:00 - 13:30
add to calendar

The star of the meeting on November 24 will be network security in the world of containers launched within Kubernetes. Three lecturers representing companies: Apius, Tiger and Arista will provide comprehensive knowledge in this area, taking into account its various aspects. We will focus on the approach to designing security policies and monitoring network traffic between containers using Calico Enterprise. Can you build secure networks?

See what Tiger's technology will give you - a demo of a solution using the security mechanisms offered by Calico Enterprise.


In the webinar program:

  • Transparent Network Security in Kubernetes with Calico Enterprise. (Presentation in English) - Jane Cox
  • Practical examples of securing application network traffic in a Kubernetes cluster - Michał Orzechowski
  • Container-friendly network infrastructure - Jarosław Grabowski.
Speakers
Michał Orzechowski
Apius Technologies SA
Michał Orzechowski zajmuje się tematyką bezpieczeństwa sieciowego w realiach rozwiązań chmurowych z wyszczególnieniem technologii kontenerowych. Prywatnie interesują go zagadnienia DevOps i obliczenia naukowe dużej skali na klastrze Kubernetes. Ostatnie 5 lat pracował w europejskich projektach naukowych, gdzie wdrażał rozwiązania kontenerowe dla aplikacji naukowych.
Prelegent Partner
Jane Cox
Tigera
He leads Tiger's team in the EMEA region introducing network security to Cloud Native organizations as well as those moving to the cloud. She has spent the last 7 years working in the areas of Security, DevOps and Kubernetes, and has worked with various organizations to help them transform their digital footprint and enable the safe adoption of Container and Cloud Native technologies in their organizations.
Jarosław Grabowski
Arista Networks
Jarosław Grabowski at Arista Networks deals with technical and business support for projects. Before joining Arista Networks, he worked for major hardware vendors such as Cisco, Alcatel, Newbrige. He is a graduate of the Telecommunications Institute at the Faculty of Electronics and the Business School of the Warsaw University of Technology. He has been associated with the ICT industry for 27 years. During these years, he participated in many technological and business transformation projects.
The meeting is dedicated to:
Application operators and owners
learn how to implement application security policies on a Kubernetes cluster, without the need to communicate with the team responsible for network security.
Engineers, security experts
learn how to combine the classic approach to network security policies with the traffic filtering mechanisms available in a Kubernetes cluster, thanks to Calico Enterprise.
Developers
how to develop applications and its network security policies in parallel.
You get:
benefit-icon
Comprehensive insight into the process combining the security of the container layer with classic access control mechanisms available in current clouds or computing centers
benefit-icon
Access to practical examples of implementing security policies with Calico Enterprise
benefit-icon
Possibility of using a free expert consultation
Partners

REGISTRATION CLOSED

File Access Management, i.e. file access management
show description

DATE:  17.09.2020

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATA: 17.09.2020
HOURS: 11:00 - 12:30
add to calendar

We invite you to the next webinar as part of our series. This time we will focus on File Access Management, i.e. managing access to files, regardless of where they are processed (local servers, NAS arrays, Cloud environments). We will present a comprehensive approach to file protection, from inventory and classification, owner determination, application of security mechanisms, to generating reports and alerts.

The presentation will be supplemented by a live demonstration, during which the possibilities of implementing individual stages of protection implementation will be presented from the tool console.

Speakers
Maciej Pęciak
Apius Technologies SA
Architekt Splunk, ES Admin, UBA / core implementation accreditation. Apius Technologies expert, a graduate of the Wrocław University of Technology, with 19 years of experience in the IT industry, mostly in the area of ​​IT Security. CISSP certificate holder. Specializing in the areas of: technological security, security management, and project management related to security.
Speaker Partner
Jakub Orkiszewski
SailPoint
Jakub Orkiszewski - Account Executive with over 10 years of experience in the IT industry. For over seven years, he has been involved in IT security projects on the Eastern European market in the area of ​​consulting, business development and sales. Currently, she represents SailPoint, whose main task is to help automate access to specific systems and applications from the level of electronic identity for individual employees and groups. In the past, he was responsible for market development and building partner channels in companies such as Dell EMC and Imperva.
The meeting is dedicated to:
IT administrator
you will learn how to use the appropriate tools to address the handling of time-consuming activities required from the point of view of IT security.
Person responsible for safety
you will find out that the level of visibility can be much better than what is offered by the built-in system mechanisms, and handling processes related to file security does not have to involve the IT team excessively
Key asset owner
you can learn about the mechanisms that will make the handling of processes such as granting permissions, recertification or remediation can be carried out by professional persons who do not need to have specialist knowledge in the field of system administration.
You get:
benefit-icon
A package of knowledge and practice regarding the file security process
benefit-icon
Access to practical examples of implementing security policies with Calico Enterprise
benefit-icon
Possibility of using a free expert consultation
benefit-icon
The ability to get to know the FAM console "live" - ​​from the point of view of the administrator, data owner or user
Partners

REGISTRATION CLOSED

CyberArk Attack and Defend - on both sides of the privileged access front.
show description

DATE:  16.07.2020

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATA: 16.09.2020
HOURS: 12:00 - 16:00
add to calendar

The proposed workshops are in the form of Attack and Defend and can be described as a virtual "war room". Enjoy a unique gameplay experience that gives you an insight into the Red Team and Blue Team strategies in action, allowing you to play as an attacker and create a better defense plan. Everything in practice, full of emotions and under the supervision of experts.

Number of participants - 20 people. We will confirm participation by phone each time.

Speaker Partner
Bartosz Kryński
CyberArk
Bartosz Kryński is Presales Team Leader at Cyberark, CISSP. For over four years he has been dealing with issues related to security and management of privileged access. Previously, working for ten years as a Security Consultant at Clico, he gained experience in the preparation and implementation of projects related to the security of ICT environments. Additionally, Bartosz participated in many penetration tests and security audits of large institutions in Poland. A graduate of the Cybernetics Department of the Military University of Technology.
Marcin Paciorkowski
CyberArk
Marcin Paciorkowski is a graduate of the Teleinformatic Systems specialization at the Faculty of Electronics of the Military University of Technology and of the postgraduate studies "Security of Information Systems" at the Warsaw University of Technology. As a Regional Sales Engineer at Cyberark, he deals with issues related to the broadly understood protection of privileged access. He has over 12 years of professional experience in the field of ICT security confirmed by numerous certificates in the field of leading security technologies (including CISSP). During his professional career, he participated in the implementation of advanced security systems as well as penetration tests and security audits of large institutions in Poland and the region.
The meeting is dedicated to:
IT specialist
- who will gain practical knowledge of the tools and methods used during attacks on privileged accounts
Senior IT Professionals
- who will learn about the planning of complete privileged access protection programs
IT security experts
- who get to know the tool used to manage and protect privileged access
You get:
benefit-icon
You will get to know the mind of a hacker and try the strategy of defense and attack in a virtual environment
benefit-icon
Possibility of using a 30-minute free expert consultation
benefit-icon
A guarantee of valuable knowledge focused on privileged users
benefit-icon
Unlimited access to the recording of the meeting
Partner

REGISTRATION CLOSED

Effective monitoring of IT services - How to control the excess of events, thanks to the "Event Analytics" functionalities in Splunk ITSI
show description
DATE:  11.02.2021

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATE: 11.02.2021
HOURS: 12:00 -14:00
add to calendar

Splunk ITSI is a top-class ITSM solution that offers numerous functionalities, not only in the field of monitoring itself, but also in the field of broadly understood event analytics.


During the webinar, our experts will present how this tool can be used to effectively manage the enormity of information from monitored systems in large-scale environments. So as not to miss any important event on the one hand, and on the other - to significantly reduce the number of threads, grouping them into a logical whole.


Mechanisms will be presented, such as: event correlation, thread aggregation or linking similar IT incidents.


As a result, participants will find that by aggregating thousands of events into a finite number of threads, monitoring can be even more effective than with the classical approach.

Speakers
Grzegorz Flak
Apius Technologies SA
A graduate of IT at the AGH University of Science and Technology Stanisław Staszic in Krakow. For 21 years he has been professionally involved in security in computer networks. He has been CISSP certified since 2005, and CISA since 2008. He is a co-founder of Apius Technologies, in which he co-creates the company's strategy in the field of design and implementation of security systems. He specializes in auditing and testing the security of clients' information systems, especially in electronic banking. Speaker at conferences in the area of ​​IT security.
Maciej Pęciak
Apius Technologies SA
He leads Tiger's team in the EMEA region introducing network security to Cloud Native organizations as well as those moving to the cloud. She has spent the last 7 years working in the areas of Security, DevOps and Kubernetes, and has worked with various organizations to help them transform their digital footprint and enable the safe adoption of Container and Cloud Native technologies in their organizations.
The meeting is dedicated to:
IT managers
who can update their knowledge about contemporary trends in techniques in the field of IT service monitoring
Business system owners
who will learn how precise / multi-faceted monitoring of services or business processes can be
IT administrators
who learn how to face the problems that in many cases make it difficult for them to conduct effective IT monitoring.
You get:
benefit-icon
Access to valuable knowledge about IT monitoring, using advanced mechanisms based, among others on machine learning
benefit-icon
Possibility to verify the real value of the solution through a discussion with one of the Clients, the User of the solution, who will present his experience in this area
benefit-icon
Recognition of the possibilities of effective monitoring above the "silos" offered by Splunk ITSI
benefit-icon
Possibility of a 30-minute free consultation with an Apius expert
Partners

REGISTRATION CLOSED

Is it very (not) safe in the container?
show description

DATE:  10.07.2020

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATA: 10.07.2020
HOURS: 12:00 - 14:00
add to calendar

Prisma Cloud Compute Edition (former Twistlock) - the future. Do developers, system and application operators love this solution?

During the webinar, participants will supplement their knowledge about container solutions. Then they will see in a lab environment, in practice - how Prisma Cloud Compute Edition differs from the traditional approach to application security.

They will also learn what the shift left security is, i.e. how to take care of the security of the application at the stage of its development and not only at the stage of its maintenance. Attentive observers will also notice that the container control policies are dynamic and use machine learning. We will also convince you that the test run of Prisma Cloud Compute Edition is not only low-labor, but also safe for the application.

Speaker
Gabriel Kujawski
Gabriel Kujawski
Since joining Palo Alto Networks professionally, he has been a technical consultant cooperating with units of the central and local government public sector and the education sector in Poland. Previously, in the same role, for years professionally associated with Cisco Systems. In his free time, he programs microcontrollers, writes python scripts, climbs and reads a lot.
The meeting is dedicated to:
Developers
will receive ongoing insight into the vulnerabilities of libraries already at the stage of building the application, minimizing the risks associated with known vulnerabilities before delivering the finished application.
Application operators and owners
they will gain real-time insight into the vulnerabilities of private and public Docker / Kubernetes infrastructure and already running applications, detection of anomalies in the functioning of Docker / Kubernetes infrastructure using machine learning.
Engineers, security experts
learn about the possibilities of protection against attacks on private and public Docker / Kubernetes infrastructure with the use of application security holes, control of the Docker / Kubernetes environment with the use of rules built with the use of machine learning.
You get:
benefit-icon
Access to valuable knowledge about application security news
benefit-icon
Recognition of preventive actions created by Prisma Cloud Compute Edition
benefit-icon
Possibility of using a free expert consultation
Partner

REGISTRATION CLOSED

Smart Security by Apius
show description
DATE:  04.06.2020

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATE: 11.02.2021
HOURS: 12:00 -14:00
add to calendar

The transition to cloud solutions and remote work has added more tasks and topics to be solved for managers and members of IT teams in companies. We know how to get access to engineers who are experts in dozens of technologies, have dozens of professional certificates, and are always available when needed. The problem of sick leaves, holidays, shortage of jobs or other random events will cease to matter.

Your team will breathe a breath, focus on priorities and tasks will be carried out on time and of high quality.

At the meeting, we will suggest how to strengthen your position in the company as an important and efficient part of an organization that is flexible and effectively achieves its goals. Everything in an accessible form of cooperation and an attractive financial formula.

Speakers
Michał Sieński
Apius Technologies SA
A graduate of PJWSTK in Warsaw. Architect of IT security solutions. I deal with consulting, design and implementation of modern systems in the field of information security and IP communication. He has many years of experience in managing and implementing projects in the public, banking, insurance and telecommunications sectors.
The meeting is dedicated to:
Managers, IT Directors
you will carry out statutory activities in the field of IT security, you will ensure the continuity of processes, their effectiveness and high SLA parameters, you will focus on the development of your area
HR process managers
the problem of the lack of highly qualified staff will disappear, you will take care of the effectiveness of employment and maintain planned costs
IT team employees
you will get rid of tedious, repetitive activities, you will calmly go on vacation, you will focus on monitoring outsourced processes
You get:
benefit-icon
Possibility of using a 30-minute free expert consultation
benefit-icon
A guarantee of valuable knowledge
benefit-icon
Bezterminowy dostęp do nagrania ze spotkania

REGISTRATION CLOSED

Practical use of SOAR to combine Splunk Phantom
show description
DATE:  17.06.2021

REGISTRATION CLOSED

show description
General information
PLACE: On-line
DATE: 17.06.2021
HOURS: 12:00 -14:00
add to calendar

We propose to transfer knowledge to practice. During the workshops, you will broaden your knowledge about the possibility of automating and organizing processes in SOC / NOC - in particular:

How to standardize the handling of events of various types with the use of appropriate tools,

How to relieve the staff of repetitive and low-development tasks and enable them to focus on those activities that have the greatest value for the company,

Where in the event handling process there are opportunities to shorten the time (reaction / problem solution) thanks to the use of automation,

Is SOAR a security tool only, and will it also handle other types of tasks?

And above all - we will try to show that thanks to the SOAR class solution, it is possible to handle more events per day without the need to increase the size of the SOC / NOC team.

Speakers
Grzegorz Flak
Apius Technologies SA
A graduate of IT at the AGH University of Science and Technology Stanisław Staszic in Krakow. For 21 years he has been professionally involved in security in computer networks. He has been CISSP certified since 2005, and CISA since 2008. He is a co-founder of Apius Technologies, in which he co-creates the company's strategy in the field of design and implementation of security systems. He specializes in auditing and testing the security of clients' information systems, especially in electronic banking. Speaker at conferences in the area of ​​IT security.
Maciej Pęciak
Apius Technologies SA
He leads Tiger's team in the EMEA region introducing network security to Cloud Native organizations as well as those moving to the cloud. She has spent the last 7 years working in the areas of Security, DevOps and Kubernetes, and has worked with various organizations to help them transform their digital footprint and enable the safe adoption of Container and Cloud Native technologies in their organizations.
The meeting is dedicated to:
Security analysts
who will gain a better understanding of this area of ​​security solutions
Coordinating the work of security teams
which will acquire knowledge to improve the work of the team / better use of human resources
Analysts, SOC / NOC operators
who will have the opportunity to familiarize themselves with the friendly and intuitive interface for everyday work on event handling
The participant receives:
benefit-icon
Recognition of the practical possibilities of SOAR solutions, based on a specific example, presented on a live system
benefit-icon
A guarantee of valuable knowledge
benefit-icon
Opportunity to discuss / obtain answers to bothering questions in the field of Automation / Orchestration SOC, NOC
Partners