Speaker

Siri Varma Vegiraju

Siri Varma Vegiraju

Microsoft, Tech Lead

Seattle, Washington, United States

Actions

Siri Varma Vegiraju is a seasoned expert in healthcare, cloud computing, and security. Currently, he focuses on securing Azure Cloud workloads, leveraging his extensive experience in distributed systems and real-time streaming solutions. Prior to his current role, Siri contributed significantly to cloud observability platforms and multi-cloud environments. He has demonstrated his expertise through notable achievements in various competitive events and as a judge and technical reviewer for leading publications. Siri frequently speaks at industry conferences on topics related to Cloud and Security and holds a Masters Degree from University of Texas, Arlington with a specialization in Computer Science.

Area of Expertise

  • Information & Communications Technology
  • Real Estate & Architecture

Topics

  • open source
  • Information Tehnology
  • Big Data
  • Cloud
  • Cloud Native
  • OpenTelemetry
  • Dapr
  • Cloud Security
  • apis
  • Information Technology
  • DevOps
  • Cloud & DevOps
  • DevOps & Automation
  • Azure DevOps
  • DevSecOps
  • Software Deveopment
  • Agile software development
  • Software Development
  • Development
  • DevOpsCulture
  • Backend Development
  • Front-End Development
  • Mobile Development
  • MobileDevOps
  • DevOps Skills
  • AWS DevOps
  • Azure Services and DevOps
  • DevOps Transformation
  • SecDevOps
  • DevOps Journey
  • DevOps Agile Methodology & Culture
  • Azure DevOps Pipelines
  • SQL
  • dotNet
  • Java
  • Microserivces
  • Container
  • Container Security
  • Kubernetes

From Red to Green: Enhancing Security Culture with Key Progress Indicators

In today’s rapidly evolving security landscape, building a culture of security ownership across development, security, and operations teams is no longer optional—it’s essential. This session will explore how organizations can bridge the gap between these teams by leveraging KPI dashboards to enhance visibility, accountability, and continuous improvement in security practices.

We will discuss strategies for building a security-first culture where every team takes ownership of security controls. By implementing KPI dashboards that visualize the status of security controls—whether red, yellow, or green—teams can gain immediate insight into their security posture. These dashboards will serve as the foundation for a security health scorecard, which can be reviewed and discussed at the organizational level.

Building a Network Telemetry Platform to minimize Security Threats

Maintaining robust network security in the cloud environment is more crucial than ever. This talk explores the design and implementation of a proactive network telemetry platform that strengthens infrastructure security. The platform collects and analyzes telemetry data from virtual machines to identify and scrutinize traffic patterns deviating from industry-standard baselines. By generating actionable insights and promptly notifying relevant teams of potential issues, it enables swift problem resolution. This proactive approach significantly reduces the attack surface, minimizes exposure to network attacks, and enhances overall cloud security.

What is threat modelling and how to encourage your organization to adopt it ?

The complexity of open source tech stacks demands efficient threat modeling to stay ahead of evolving threats. In this talk, we will cover the fundamentals of threat modeling, focusing on essential parameters for a thorough threat model review using a practical service example. Additionally, we’ll explore how to establish a culture of recurring threat model reviews within your organization to adapt to continuously evolving services and emerging threats.

The story of ingesting millions of datapoints using Kafka and StarRock

With the rapid growth in Cloud, the amount of telemetry that needs to be processed has grown exponentially. This presentation delves into use of Apache Kafka and StarRock to ingest millions of network records per day, enabling security teams to visualize the network topology of different services and identify anomalies . We will delve into

* Kafka Architecture that supports this scale.
* StarRock partitioning strategies for high frequency reads.
* The challenges we encountered in production and the solutions we implemented to overcome them.

Leveraging Argo Events and Argo Workflows for Scalable Data Ingestion

As Argo Workflows and Argo Events continue to gain popularity for their powerful capabilities in event-driven automation and complex job orchestration, this presentation will delve into how we used this architecture to process millions of records daily.
You will gain insights into the specific architecture that integrates Argo Events and Argo Workflows to achieve efficient data aggregation and ingestion. We will discuss the challenges encountered during this process and share the strategies we employed to overcome these issues. Attendees will also learn how we use techniques like "Work avoidance" to ensure we don't redo the work.

Enhancing Workflow Reliability with Dapr: Techniques to Minimize Failure Costs

A long-running workflow typically consists of a series of steps leading to its completion. However, a failure in one step might require restarting the entire workflow, which is costly. Breaking each step into its own workflow can mitigate this issue but introduces challenges in workflow management.

Dapr can help achieve best of both worlds. In this talk, we will explore how to use Dapr constructs such as stateful workflows, activities, and replays to curate workflows that minimize the cost of failures while still abstracting away the complexities of workflow management.

Siri Varma Vegiraju

Microsoft, Tech Lead

Seattle, Washington, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top