Visualization of Network Security Configuration

A picture may be worth a thousand words, but visualization of complex network data is worth so much more, especially when visualizing security configuration.

This presentation will show a dashboard approach to visualize:

  • Permissions segmentation in company-wide application
  • Directory services structure and permissions
  • Logical network segmentation structure

Speakers:

  • Jacek Szamrej – Vice President of Cybersecurity – SEDC
  • Scott Lee – Manager, Information Systems – Central Alabama Electric Cooperative