Thursday, June 16, 2016 - Washington DC?>
About this event
Mark your calendar for this annual event for government IT leaders and practitioners.
Our dynamic agenda will cover the hottest topics in IT, from cybersecurity, mobility, cloud, and application delivery. Come and hear expert keynotes, learn new strategies for application delivery, and cyber security while networking with your peers in the public sector.
Delivering applications securely to anyone, anywhere, at any time is complex, especially while balancing the need to meet Federal mandates. This day is focused on providing valuable insights around Cyber Security stratagems like SSLi (SSL Intercept) and securely delivering applications into a cloud infrastructure - any cloud infrastructure - public, private, or SAAS. Hear from industry experts and Government Agency leaders on how they are working to keep ahead of the ever growing threats from rogue nation states, hacktivists, and bad actors on the internet.
Justify your trip - showcase the value of the F5 Government Technology Symposium - download our letter template to justify your trip.
Thursday, June 16, 2016
8:00am - 2:00pm
The Newseum - Knight Conference Center
555 Pennsylvania Ave. NW
Washington, D.C. 20001
Follow us on Twitter #F5GovSym
6/16/2016 8:30 AM
Security Solutions for the Federal Government
Click on each session to download the archived presentation.
Registration, Networking, and Breakfast
Nick Marinos, Assistant Director, GAO, Information Technology Audit Team
Risk Management and Strategic Planning in Security
Federal agencies depend heavily on information systems andelectronic data to carry out their operations and to process, maintain, andreport essential information. While bringing numerous benefits, these systemscan be vulnerable to cyber threats and incidents, which have continued toincrease in recent years. Consequently, security considerations are essentialas the federal government invests over $80 billion in IT annually. Nick willdiscuss recent GAO reviews related to cybersecurity and IT acquisition anddevelopment, as well as steps agencies can take to bake security into systemdevelopment and risk management.
Breakout Session #1 10:00-10:45am
Access Policy Manager (APM) 101 - Joe Grone, F5 Field Systems Engineer Introduction to F5 Authentication and Single Sign on solution, Access Policy Manager. Understand how APM secures and differentiates access to your applications, data, network, and the cloud based on user identity and context. Learn how to use BIG-IP APM to unify and enforce identity-based, context-aware, and policy-driven application access control—regardless of the location of the user or the application. SSL Visibility and Intercept - Ron Cochran, F5 Field Systems Engineer With federal mandates demanding SSL everywhere, there is a need to balance encrypting all of our traffic, while providing needed visibility for security solutions into what is traversing our network. This session will provide an introductory overview to F5’s SSL Intercept and Visibility Solution (SSLi). You will learn the basic concepts of SSL intercept, hear several use cases and architectures and discuss best practices when deploying an SSLi solution. F5 Hardening to Meet Federal Security Mandates - Michael Coleman, F5 Sr. Field Systems Engineer With F5 being deployed in most federal demilitarized zones (DMZs) it is important to understand how to lock down access and harden the Traffic Management Operating System (TMOS) to mitigate vulnerabilities, and meet your compliance requirements at the same time. F5 Virtualization and Government Cloud - Lyle Marsh, F5 Field Systems Engineer, Dung Lam, F5 Field Systems Engineer This session will focus on leveraging F5’s virtual edition and Big IQ management console too quickly and easily spin-up application services in private or public cloud environments. Virtual Editions offer on-demand deployment options for high-density and multi-tenant infrastructures, so you can make new applications available to users in minutes
Breakout Session #2 11:00-11:45am
F5 Authentication Services - CAC/PIV - Michael Coleman, Sr. F5 Field Systems Engineer F5's Access Policy Manager (APM) is the the de facto standard for doing advanced authentication into secure environments. Understand how to leverage the F5 to CAC enable all of your mission critical applications. SSL Visibility and Intercept - Ron Cochran, F5 Field Systems Engineer With federal mandates demanding SSL everywhere, there is a need to balance encrypting all of our traffic, while providing needed visibility for security solutions into what is traversing our network. This session will provide an introductory overview to F5's SSL Intercept and Visibility Solution (SSLi). You will learn the basic concepts of SSL intercept, hear several use cases and architectures and discuss best practices when deploying an SSLi solution. F5 12.x Updates - Ryan Johnson, F5 Sr. Field Systems Engineer This session will provide an overview of the latest version of the F5 Traffic Management Operating System (TMOS) and the new features and enhancements available in version 12. You will learn which features will benefit your existing applications like Exchange Sharepoint, Oracle, etc. F5 Authentication Services in the Cloud - Office 365 - John Inscoe, F5 Field Systems Engineer Take advantage of the Cloud First Initiative by understanding how to use F5's Access Policy Manager (APM) to provide single sign on and access to 3rd party and web based applications like Office 365.
Panel Session: Managing Your Risk in an Encrypted World
Lance Dubsky, Chief Security Strategist, FireEye
Matt Schneider, Senior Director, VMware Network and Security (NSX) Business Unit
Ronald J. Yearwood, Section Chief of the Cyber Operations Section III, FBI Cyber Division
*Agenda is subject to change
Check back soon for speaker announcements and updates!
Federal News Radio Host
Chief Security Strategist, FireEye
Chief IT Systems Architect, Hill AFB Enterprise Data Center, US Air Force
Matthew G. Schneider
Senior Director, VMware Network and Security (NSX) Business Unit
Assistant Director, GAO, Information Technology Audit Team
Ronald J. Yearwood
Section Chief of the Cyber Operations Section III, FBI Cyber Divison
The F5 Government Technology Symposium is proudly sponsored by:
Follow Us on Twitter
Cybersecurity Solutions for Government
The dedicated Cybersecurity and Defense team at Carahsoft specializes in providing government agencies with a variety of solutions to secure the cyber ecosystem. Our trained and certified representatives have a thorough understanding of the government's cyber requirements and mandates, allowing us to accurately match our cybersecurity portfolio with our customers' specific needs.
Carahsoft has partnered with numerous technology providers to offer government entities proven, cost effective protection for critical networks and digital information. These solutions, all of which are available via our GSA schedule, are highlighted below and address federal, state, and local government requirements in the areas of: Security, Encryption, Continuous Diagnostics & Mitigation, Insider Threat, Security Intelligence, Database Security, and Proactive Defense.
Get in touch
Please contact us with any questions or for more information about this event