Deep technical sessions from the engineers and leaders building enterprise infrastructure at Fortune 500 scale. Watch on your schedule or register for upcoming live events.
Zero-Trust Architecture: From Theory to Production
David Reyes
CISO
A comprehensive walkthrough of migrating a Fortune 500 enterprise from perimeter-based security to a fully operational zero-trust architecture. David covers the three-phase migration framework Novastraxis has refined across 400+ implementations, including identity foundation, microsegmentation rollout, and continuous verification enforcement. Includes real metrics from production deployments and hard lessons learned from the field.
Sarah shares the operational playbook behind the largest single-customer migration in Novastraxis history: moving 10,000 production workloads across three cloud providers with zero customer-facing downtime. Covers pre-migration assessment, dependency mapping, traffic shifting strategies, and the real-time monitoring dashboards that kept the team informed throughout the 72-hour cutover window.
Marcus dives deep into the architectural decisions behind the Novastraxis Data Mesh Engine, which now manages over 14 petabytes of federated enterprise data. This session covers domain boundary design, data contract specification, self-serve infrastructure provisioning, and the governance patterns that enable hundreds of autonomous teams to operate without a centralized data team.
An unvarnished look at the 18-month journey to FedRAMP High authorization. David shares the documentation burden, the engineering changes required, the 3PAO assessment process, and the ongoing continuous monitoring commitments. This session is designed for security and compliance leaders evaluating FedRAMP authorization for their own platforms, with practical guidance on timeline estimation and resource planning.
After auditing 1,200+ enterprise Kubernetes deployments, Dr. Patel presents the most common security misconfigurations and how to eliminate them. Covers pod security standards, RBAC gap analysis, supply chain attack prevention with SLSA and Sigstore, runtime anomaly detection, and network policy enforcement. Includes a live demonstration of lateral movement in a misconfigured cluster.
Kenji walks through the observability architecture that monitors the Novastraxis platform across 48 global regions. This session covers structured logging at scale, distributed tracing with OpenTelemetry, metric aggregation pipelines, SLO-based alerting, and the custom correlation engine that reduces alert noise by 94%. Practical guidance for teams building their own observability stacks.
Security leaders are increasingly expected to present to the board, but most board-level reporting fails to communicate risk in business terms. David shares the reporting framework he has developed over 15 years of board presentations, covering risk quantification, metric selection, threat landscape summaries, and how to translate technical findings into investment decisions that non-technical directors can act on.
AI-Driven Threat Detection: Behind the ML Pipeline
Dr. Anika Patel
VP Engineering
A deep technical session on the machine learning pipeline that powers the Novastraxis Threat Analytics Engine. Dr. Patel covers feature engineering from raw security events, model architecture choices for anomaly detection, the feedback loop between SOC analysts and model retraining, and how the system processes 14 billion events daily with sub-second inference latency. Includes discussion of false positive reduction strategies and model explainability.
Our annual analysis based on 14 billion daily security events across 2,400+ enterprise deployments. Understand the threat landscape and the trends shaping security strategy this year.
Subscribe to get notified about upcoming live webinars, new on-demand sessions, and exclusive Q&A opportunities with our engineering and security leadership team.
Typically 2 emails per month. Read by 18,000+ engineering leaders. Unsubscribe anytime.