Visualization of Network Security Configuration
A picture may be worth a thousand words, but visualization of complex network data is worth so much more, especially when visualizing security configuration.
This presentation will show a dashboard approach to visualize:
- Permissions segmentation in company-wide application
- Directory services structure and permissions
- Logical network segmentation structure
- Jacek Szamrej – Vice President of Cybersecurity – SEDC
- Scott Lee – Manager, Information Systems – Central Alabama Electric Cooperative