Technology Theater Agenda

Theaters Sponsored by: Hewlett Packard Enterprise

US Air Force Telephony Modernization
Presented by: World Wide Technology
Location: San Juan A
Time: 1130 - 1230


Abstract

This briefing focuses on the modernization of the legacy Time Division Multiplexing (TDM) technologies that are still widely deployed in the USAF as the primary communications systems. This presentation addresses the risks of relying on the aging architecture and the benefits associated with modernizing to current Commercial off the shelf (COTS) technologies. It includes guidance on how to eliminate these risks by outlining a path to decommission the legacy voice equipment reducing hardware footprint and costs while posturing a pathway to support the future initiatives of UCaaS, EITaaS, etc.

DCOI Made Simple: On Prem Secure Private Cloud via FlexCap IaaS
Location: San Juan B
Time: 1130 - 1230


Abstract

The Data Center Optimization Initiative (DCOI) requires the consolidation and modernization of IT infrastructure. Most agencies have fallen behind OMB’s aggressive targets and are struggling to find fast ways to, “transition to more efficient infrastructure, such as cloud services and… Leverage technology advancements to optimize infrastructure.” As with most mandates, this transformation is easier said than done.

Leveraging Flexible Capacity can quickly solve all of the foregoing, while removing the most painful aspects. In this session, you can learn how adopting a true Flexible Capacity solution allows IT leaders to modernize their entire infrastructure without acquiring new equipment, leverage the economics of a cloud operating model, maintain control and security of your most sensitive and mission-critical infrastructure and data, and achieve DCOI success without the full burden of Application Modernization.

In addition, Flexible Capacity offers significant cyber security benefits over public cloud. Most notable among them are control over on-premise physical security, and control over and assurance with respect to critical firmware and software patches and updates, ensuring your environment has the latest and greatest protection. The same is true for any government policy changes; they can be implemented in your environment with greater speed than in public cloud. And, if you can specify certain hardware, such as HPE Proliant servers which are the only servers featuring silicon-based security, addressing firmware attacks. HPE servers are the world’s most secure industry standard servers, potentially making your flexible capacity solution the world’s most secure private cloud.

This session is for you if you want to develop a strategy to

  1. refresh your infrastructure,
  2. be able to deploy new capabilities and capacity on demand and with the highest level of security,
  3. free your people up to work on higher–level tasks, and
  4. deliver on the DCOI initiative.


Speaker

Brian Falvey - Director, Pointnext Public Sector and Canada, Hewlett Packard Enterprise

Ensuring Maximum Availability for Mission Critical Data, Applications, and Systems
Location: San Juan A
Time: 1400 - 1500


Abstract

Veeam® Availability Suite™ enables the recovery of any IT service and related applications and data within seconds and minutes. Turn your enterprise into a Hyper-Available enterprise with Veeam Availability Suite for any app, any data and any cloud.

F5 solutions for the Secure Cloud Computing Architecture (SCCA)
Presented by: F5 Networks
Location: San Juan B
Time: 0800 - 0900


Abstract

The SCCA defines a set of guidance on requirements for securing Cloud Computing Environments based on US DoD experience.

It outlines recommended components including a Cloud Access Point (CAP), Virtual Datacenter Security Stack (VDSS), Virtual Datacenter Managed Service (VDMS), and Trusted Cloud Credential Manager (TCCM).

This presentation will focus on the deployment of F5 virtual editions in support of the secure cloud computing architecture. The architecture fulfills requirements around segmentation of traffic, visibility of encrypted traffic and security of application protocols that the secure cloud computing architecture outlines. The architecture is cloud agnostic and could be deployed across any cloud environment that F5 virtual editions support, Azure or Amazon etc.

Core Principals of Cyber Hygiene in a World of Cloud and Multi-Domain Operations
Presented by: VMware
Location: San Juan A
Time: 1130 - 1230


Abstract

Cybersecurity is top concern at the highest levels of government, particularly in multi-domain Operations, which is prompting ever increasing investments to secure systems and data. Yet across government and industry, as investments in cybersecurity accelerate, breaches continue to occur at an alarming frequency. Clearly what we, collectively, are doing in cybersecurity is not working. In this talk we propose five core principals of cyber hygiene as a universal baseline; the most important and basic things organizations should be doing. The principals discussed are rooted in well-established frameworks such as the NIST Cybersecurity Framework (CSF) and are technology-neutral. In the most devastating breaches over the last few years – from Target to Sony to OPM to DoD specific breaches – we believe effectively adhering to these principals would have made a meaningful difference. We will cover a brief review of key breaches; what happened, why it happened, and how similar attacks can be mitigated going forward. We will discuss the benefits of focusing security efforts on protecting applications, specifically mission-critical applications.


Speaker

Don Bailey is a VMware Enterprise Solutions Architect supporting National Security accounts including select Air Force accounts around Cyber Security. Prior to joining VMware, Don spent 23 years at CIA as a technical operations officer, manager, and senior research engineer. In the 10 years prior to retiring from CIA, Don specialized in offensive Cyber operations and was a lead researcher and developer of offensive IO capabilities. Don has presented at a number of Cyber Security conferences including a keynote address at NSA’s FVEYs conference, CIA Emerging Technologies conferences, Black Hat, and DerbyCon.

Achieving Instant Situational Awareness in Secure Command and Control Environments
Location: San Juan B
Time: 1130 - 1230


Abstract

The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. The analysis of this information happens in a secure command and control operations center, often with joint forces working together. The current focus of the design and operation of these command centers is “Achieving Instant Situational Awareness;” that is, “how can I use the ISR sources available to give me a full and instant picture of the situation?”

In this session, you will learn how to:

  • Achieve information superiority and instant situational awareness through immediate access to critical video and data resources
  • Simplify management of multiple classifications through a single IA (information assurance) approved secure infrastructure
  • Increase your cyber security profile while mitigating the threat of intentional or accidental breach by insiders
  • Reduce up-front IT and AV infrastructure expense while lowering long-term total cost of ownership

The path to an Integrated Cyber Security Architecture
Presented by: World Wide Technology
Location: San Juan A
Time: 1400 - 1500


Abstract

WWT describes both AF and industry-wide challenges around traditional security architectures. Current endpoint security architecture is hampered by too many tools, often in conflict with security assurance that falls short of the objective endstate. Defense in Depth strategies can be effective, but not as a “silo” with no context exchange between the other defensive layers. WWT proposes securing the environment, with complete control and visibility across the boundary, the network, and the endpoints. Orchestration through a “Single Plane of Glass” streamlines a highly integrated or “holistic” endpoint security; encompasses centralized management and reporting, fusion of inherent visibility of network devices, and automatically responds to security threats into a strategy for incorporating existing tools, reducing overlap and waste, into a cohesive security architecture.

IoT – technology realities, and the evolution of business processes and the role of IT
Location: San Juan B
Time: 1400 - 1500


Abstract

The hype surrounding IoT can obscure the important realities of IoT. The implications of certain realities – for example physics limitations of radios and power distribution, practical limitations of data science expertise to train, validate, and manage models, and process limitations surrounding the adoption of new user experiences and business process change – will cause some solutions to be widely adopted much more quickly than others. This session will explore those factors that drive or stall this adoption, and how.


Speaker

Lin Nease, Chief Technologist, IoT - Enterprise Group; Hewlett Packard Enterprise