Visualization of Network Security Configuration


A picture may be worth a thousand words, but visualization of complex network data is worth so much more, especially when visualizing security configuration.

This presentation will show a dashboard approach to visualize: 

  • Permissions segmentation in company-wide application
  • Directory services structure and permissions
  • Logical network segmentation structure


  • Jacek Szamrej – Vice President of Cybersecurity – SEDC
  • Scott Lee – Manager, Information Systems – Central Alabama Electric Cooperative