About Anuj Varma, Seminar Leader

Application Consolidation – End-of-Life and Legacy Apps Consolidation

In short time-frames, Anuj helps with:

  • Assessment of overall corporate cloud strategy, including securing assets in the cloud *
  • End-of-Life applications and assets assessment, consolidation and remediation strategy *
  • Review of Disaster Recovery and Business Continuity plans for core  and mission critical apps  *
  • I.T. Audit, COBIT, Architecture Governance and IT Infrastructure standards  *
  • Review of the overall corporate security strategy *

* Some engagements may require additional resources.

Overall Cloud (including devops) Strategy

  • IaaS, PaaS, HA, DR, Hybrid Cloud Strategy
  • IAM in the Cloud, AD Integration, Azure AD, Microsoft Identify, AWS IAM
  • VPCs, Subnets, Security Groups, Firewalls, WAFs, Proxies…
  • Application Devops, Infrastructure Devops –
    • Provisioning
    • Configuration
    • Orchestration
    • Deployment
  • Microservices, Integration (In process and out of process), EAI, SOA….

Have Anuj review and provide optimization recommendations for your cloud strategy. Anuj has worked with CISOs, CFOs and CIOs to help lower costs of application remediation, migration and consolidation.

Security Strategy – Web, Cloud and Data

  • Attack Vectors. Intrusion Prevention, Common Attacks, Social Engineering Attacks
  • OWASP Seminar Training Top 10 – Cross Site Scripting , Request Forgery, SQL Injection, Character Encoding, Session Hijacking, Authentication, Authorization loopholes
  • Best Practices to Secure your Web Applications -  in the Cloud, On-Premises
  • Web Services Security
    • Securing SOAP and RESTFul Services
    • Securing Middleware, EAI and Messaging Systems
    • Securing your devops pipeline, including CHEF Servers
    • Securing your network, hybrid cloud, VPCs, Subnets, Security Groups
    • Identity and Access Management
    • IAM in Azure, AWS and Google Cloud

  • Static and Dynamic Code Inspection, Passive and Active Monitoring, Fiddler and Fiddler Watcher, HP WebInspect, HP Fortify
  • Network level vulnerability scanning tools, Nessus, Nikto, Kali Linux Seminar…
  • Proxies and Load Balancers , Forward, Reverse Proxies, Tunneling, NATing, VPNs…

  • Compromising Network Proxies and Network/App Load Balancers
  • SSL Certificate Interception
  • Cryptographic Techniques to exploit known secure channels

Scientific and Math Modeling Consulting

  • Anuj helps companies build mathematical models for both, product design as well as predictive analysis (population models etc.) – using Monte Carlo Simulations, Numerical Modeling and industry standard tools (Matlab, Mathematica, SAS).

CxO Confidant and Trusted Tech Advisor

  • Anuj continues to build long-term  relationships with CIOs, CTOs, CFOs and other CxOs.
  • Anuj has helped CxOs save thousands, and in some cases, millions of dollars as a result of ignoring the hype and evaluating each tech offering on it's merits. 
  • Separating hype from reality is what culminated in 'The Ultimate Technology Seminar for Executives (TUTSE ™)