
Siri Varma Vegiraju
Microsoft, Tech Lead
Seattle, Washington, United States
Actions
Siri Varma Vegiraju is a seasoned expert in healthcare, cloud computing, and security. Currently, he focuses on securing Azure Cloud workloads, leveraging his extensive experience in distributed systems and real-time streaming solutions. Prior to his current role, Siri contributed significantly to cloud observability platforms and multi-cloud environments. He has demonstrated his expertise through notable achievements in various competitive events and as a judge and technical reviewer for leading publications. Siri frequently speaks at industry conferences on topics related to Cloud and Security and holds a Masters Degree from University of Texas, Arlington with a specialization in Computer Science.
Area of Expertise
Topics
Building Agentic AI using Cloud Native Infrastructure
Dapr Agents is a new open-source cloud framework designed to simplify the development of AI agents capable of reasoning, acting, and collaborating using large language models (LLMs). Built on Dapr's core building blocks, such as Workflows, it facilitates the creation of reliable and fault-tolerant agents.
In this talk, we will explore how to build these agents infrastructure using Dapr with a live demonstration.
Key Takeways:
* Understanding Distributed application runtime (Dapr)
* What is Dapr agentic framework ?
* How to build agentic infrastructure using Dapr agent framework ?
Build Agents using Cloud Native Infrastructure
Dapr Agents is a new open-source cloud framework designed to simplify the development of AI agents capable of reasoning, acting, and collaborating using large language models (LLMs). Built on Dapr's core building blocks, such as Workflows, it facilitates the creation of reliable and fault-tolerant agents.
In this talk, we will explore how to build these agents' infrastructure using Dapr with a live demonstration.
Key Takeaways:
* Understanding Distributed application runtime (Dapr)
* What is Dapr agentic framework?
* How to build agentic infrastructure using Dapr agent framework?
Building Secure API's
APIs are the backbone of modern applications, but securing them requires more than just enabling authentication. In this session, we’ll dive into key security principles for API protection, covering authentication, authorization, and code validation strategies. We’ll explore how to leverage C# capabilities, such as middleware, attributes, and analyzers, to enforce security best practices at compile-time and runtime. Additionally, we’ll discuss common vulnerabilities and how to mitigate them, ensuring your APIs remain resilient against evolving threats. Whether you’re building internal services or public-facing APIs, this talk will provide actionable insights to enhance your security posture.
Enforcing Cloud Compliance with Policies
Cloud compliance is essential for maintaining security, ensuring operational consistency, and meeting regulatory requirements. This session will dive into the fundamentals of policy management — exploring why organizations need policies to govern their cloud resources.
We will cover practical examples of policies that enforce security standards, manage resource configurations, and ensure cost optimization. You'll learn how to apply these policies effectively using Azure Policy Management, which offers robust tools for defining, assigning, and evaluating policies at scale.
To bring concepts to life, the session will conclude with a live demonstration on writing and applying Azure Policies to manage cloud resources in real-time. Attendees will leave with actionable insights into how to achieve compliance and governance in their cloud environments.
Enhancing Workflow Reliability with Dapr: Techniques to Minimize Failure Costs
A long-running workflow typically consists of a series of steps leading to its completion. However, a failure in one step might require restarting the entire workflow, which is costly. Breaking each step into its own workflow can mitigate this issue but introduces challenges in workflow management.
Dapr can help achieve best of both worlds. In this talk, we will explore how my team is using Dapr constructs such as stateful workflows, activities, and replays to curate workflows that minimize the cost of failures while still abstracting away the complexities of workflow management.
Enhancing Runtime Security in Cloud-Native Infrastructure
As organizations embrace cloud-native architectures, securing workloads at runtime becomes critical. In this talk, we’ll explore how Falco, the CNCF open-source runtime security project, provides deep visibility into container activity to detect and respond to threats in real-time. We'll discuss how Falco’s rule-based engine monitors system calls, identify anomalies and generate alerts. Through practical demonstrations, you’ll learn how to customize rules and integrate with incident response.
Exploiting API Misconfigurations: Lessons from Real Attacks & How to Secure Them
APIs are the backbone of modern applications, but without proper security, they are vulnerable to DDoS attacks, data exfiltration, and business disruption. In this talk, we’ll explore key OWASP API security vulnerabilities, real-world breaches caused by misconfigured APIs, and mitigation strategies through proper security configurations.
We'll cover critical concepts like Broken Object Level Authorization (BOLA), Broken Function Level Authorization (BFLA), infrastructure security, and the importance of using Identity Providers (IDPs) instead of building custom authentication systems. Through live code examples, we’ll demonstrate common vulnerabilities and how to remediate them using robust validation and access control mechanisms.
From Code to Cloud: Embedding Security in Every Step
As developers strive to move fast, security cannot be an afterthought. This talk explores how to embed DevSecOps practices throughout the software delivery process, from writing code on the developer’s machine to its deployment in production. We’ll discuss critical security checkpoints from developer machines to production deployment, and effective strategies to ensure a seamless, secure deployment. Join us to learn how to protect your application delivery pipeline!
How to scale your Observability across Cloud Platforms
Enterprises managing multi-cloud environments face significant challenges in achieving comprehensive observability across diverse infrastructures. This talk highlights the essential role of standardized, vendor-agnostic approaches in ensuring scalability and usability in modern monitoring practices. We'll explore the complexities of observability, focusing on the need for consistent management of metrics and logs across multiple cloud providers. A detailed case study will demonstrate how OpenTelemetry can unify data collection without vendor lock-in. Attendees will gain actionable insights to enhance visibility and operational resilience in their multi-cloud deployments.
How to scale your Observability across Cloud Platforms
Enterprises managing multi-cloud environments face significant challenges in achieving comprehensive observability across diverse infrastructures. This talk highlights the essential role of standardized, vendor-agnostic approaches in ensuring scalability and usability in modern monitoring practices. We’ll explore the complexities of observability, focusing on the need for consistent management of metrics and logs across multiple cloud providers. A detailed example will demonstrate how open-source tools like OpenTelemetry can unify data collection without vendor lock-in. Attendees will gain actionable insights to enhance visibility and operational resilience in their multi-cloud deployments.
Simplifying Multi-Cloud Observability with OpenTelemetry
Enterprises managing multi-cloud environments face significant challenges in achieving comprehensive observability across diverse infrastructures. This talk highlights the essential role of standardized, vendor-agnostic approaches in ensuring scalability and usability in modern monitoring practices. We'll explore the complexities of observability, focusing on the need for consistent management of metrics and logs across multiple cloud providers. A detailed case study will demonstrate how open-source tools like OpenTelemetry can unify data collection without vendor lock-in. Attendees will gain actionable insights to enhance visibility and operational resilience in their multi-cloud deployments.
Simplifying Multi-Cloud Observability
Enterprises managing multi-cloud environments face significant challenges in achieving comprehensive observability across diverse infrastructures. This talk highlights the essential role of standardized, vendor-agnostic approaches in ensuring scalability and usability in modern monitoring practices. We’ll explore the complexities of observability, focusing on the need for consistent management of metrics and logs across multiple cloud providers. A detailed example will demonstrate how open-source tools like OpenTelemetry can unify data collection without vendor lock-in. Attendees will gain actionable insights to enhance visibility and operational resilience in their multi-cloud deployments.
Shift Left Security with DevSecOps Practices
As developers strive to move fast, security must remain a priority. This talk explores how to embed DevSecOps practices throughout the software delivery process, from coding on a developer’s machine to production deployment. We'll cover essential security checkpoints to help ensure applications are both secure and resilient.
We will discuss about
* Threat Modeling
* Static and Runtime Security
* Supply Chain Security
* Application Monitoring from a security perspective.
The best part, we will explore all of this using Open Source and Cloud Native tooling.
Key Takeaways
* Gain insights into security practices at every stage of the SDLC.
* Discover Open Source and Cloud-Native security tools.
Processing one million data points daily with Dapr
In this talk, we'll explore how the Network Security team at Microsoft leverages Dapr to process millions of data points daily. We'll start by discussing the rationale behind choosing Dapr, our Dapr architecture and challenges encountered while running Dapr in production. We will also look at practical tips for optimizing workflows and ensuring fast recovery during failures.
Leveraging Istio Telemetry to protect your Kubernetes Cluster
Istio generates a variety of telemetry data to help monitor and understand service communication within a Kubernetes cluster. We will explore how to leverage these signals to enhance network security within the Kubernetes environment.
Key takeaways will include:
* Comparing the telemetry signals against your organization's security baselines to ensure traffic conforms to established standards.
* Generating the necessary allow and deny rules to secure your cluster by addressing any non-conformant traffic effectively.
* Strategies platform teams can use to automate the above process, enabling them to efficiently recommend policies and address non-conformant traffic across different teams running Istio.
Leveraging Argo Events and Argo Workflows for Scalable Data Ingestion
As Argo Workflows and Argo Events continue to gain popularity for their powerful capabilities in event-driven automation and complex job orchestration, this presentation will delve into how we used this architecture to process millions of records daily.
You will gain insights into the specific architecture that integrates Argo Events and Argo Workflows to achieve efficient data aggregation and ingestion. We will discuss the challenges encountered during this process and share the strategies we employed to overcome these issues. Attendees will also learn how we use techniques like "Work avoidance" to ensure we don't redo the work.
How to secure your Kubernetes cluster from Network threats and scale the strategy to different teams
Istio generates a variety of telemetry data to help monitor and understand service communication within a Kubernetes cluster. We will explore how to leverage these signals to enhance network security within the Kubernetes environment.
Key takeaways will include:
* Comparing the telemetry signals against your organization's security baselines to ensure traffic conforms to established standards.
* Generating the necessary allow and deny rules to secure your cluster by addressing any non-conformant traffic effectively.
* Strategies platform teams can use to automate the above process, enabling them to efficiently recommend policies and address non-conformant traffic across different teams running Istio.
From Red to Green: Enhancing Security Culture with Key Progress Indicators
In today’s rapidly evolving security landscape, building a culture of security ownership across development, security, and operations teams is no longer optional—it’s essential. This session will explore how organizations can bridge the gap between these teams by leveraging KPI dashboards to enhance visibility, accountability, and continuous improvement in security practices.
We will discuss strategies for building a security-first culture where every team takes ownership of security controls. By implementing KPI dashboards that visualize the status of security controls—whether red, yellow, or green—teams can gain immediate insight into their security posture. These dashboards will serve as the foundation for a security health scorecard, which can be reviewed and discussed at the organizational level.
Building a Network Telemetry Platform to minimize Security Threats
Maintaining robust network security in the cloud environment is more crucial than ever. This talk explores the design and implementation of a proactive network telemetry platform that strengthens infrastructure security. The platform collects and analyzes telemetry data from virtual machines to identify and scrutinize traffic patterns deviating from industry-standard baselines. By generating actionable insights and promptly notifying relevant teams of potential issues, it enables swift problem resolution. This proactive approach significantly reduces the attack surface, minimizes exposure to network attacks, and enhances overall cloud security.
What is threat modelling and how to encourage your organization to adopt it ?
The complexity of open source tech stacks demands efficient threat modeling to stay ahead of evolving threats. In this talk, we will cover the fundamentals of threat modeling, focusing on essential parameters for a thorough threat model review using a practical service example. Additionally, we’ll explore how to establish a culture of recurring threat model reviews within your organization to adapt to continuously evolving services and emerging threats.
The story of ingesting millions of datapoints using Kafka and StarRock
With the rapid growth in Cloud, the amount of telemetry that needs to be processed has grown exponentially. This presentation delves into use of Apache Kafka and StarRock to ingest millions of network records per day, enabling security teams to visualize the network topology of different services and identify anomalies . We will delve into
* Kafka Architecture that supports this scale.
* StarRock partitioning strategies for high frequency reads.
* The challenges we encountered in production and the solutions we implemented to overcome them.
Leveraging Argo Events and Argo Workflows for Scalable Data Ingestion
As Argo Workflows and Argo Events continue to gain popularity for their powerful capabilities in event-driven automation and complex job orchestration, this presentation will delve into how we used this architecture to process millions of records daily.
You will gain insights into the specific architecture that integrates Argo Events and Argo Workflows to achieve efficient data aggregation and ingestion. We will discuss the challenges encountered during this process and share the strategies we employed to overcome these issues. Attendees will also learn how we use techniques like "Work avoidance" to ensure we don't redo the work.
Enhancing Workflow Reliability with Dapr: Techniques to Minimize Failure Costs
A long-running workflow typically consists of a series of steps leading to its completion. However, a failure in one step might require restarting the entire workflow, which is costly. Breaking each step into its own workflow can mitigate this issue but introduces challenges in workflow management.
Dapr can help achieve best of both worlds. In this talk, we will explore how to use Dapr constructs such as stateful workflows, activities, and replays to curate workflows that minimize the cost of failures while still abstracting away the complexities of workflow management.
TechBash 2025 Sessionize Event Upcoming
The Commit Your Code Conference 2025! Sessionize Event Upcoming
Scenic City Summit 2025 Sessionize Event
DeveloperWeek 2025 Sessionize Event
KCD Accra Ghana 2024 Sessionize Event
Open Source Analytics Conference 2024 Sessionize Event
DevFest KC 2024 Sessionize Event
Denver Dev Day | Developer's Conference | October 2024 Sessionize Event
Dapr Day 2024 - VIRTUAL Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top