F5 Government Technology Symposium

Thursday, June 16, 2016 - Washington DC

?>

About this event

Mark your calendar for this annual event for government IT leaders and practitioners.

Our dynamic agenda will cover the hottest topics in IT, from cybersecurity, mobility, cloud, and application delivery. Come and hear expert keynotes, learn new strategies for application delivery, and cyber security while networking with your peers in the public sector.

Delivering applications securely to anyone, anywhere, at any time is complex, especially while balancing the need to meet Federal mandates. This day is focused on providing valuable insights around Cyber Security stratagems like SSLi (SSL Intercept) and securely delivering applications into a cloud infrastructure - any cloud infrastructure - public, private, or SAAS. Hear from industry experts and Government Agency leaders on how they are working to keep ahead of the ever growing threats from rogue nation states, hacktivists, and bad actors on the internet.

Justify your trip - showcase the value of the F5 Government Technology Symposium - download our letter template to justify your trip.

Thursday, June 16, 2016

8:00am - 2:00pm

The Newseum - Knight Conference Center
555 Pennsylvania Ave. NW
Washington, D.C. 20001

Registration Closed

Follow us on Twitter #F5GovSym

6/16/2016 8:30 AM

00 Days
00 Hours
00 Minutes
00 Seconds

Security Solutions for the Federal Government

Agenda

Click on each session to download the archived presentation.

  • 8:00-9:00am

    Registration, Networking, and Breakfast

  • 9:00-9:15am

    Welcome

  • 9:15-9:45am

    Morning Keynote
    Nick Marinos, Assistant Director, GAO, Information Technology Audit Team

    Risk Management and Strategic Planning in Security
    Federal agencies depend heavily on information systems andelectronic data to carry out their operations and to process, maintain, andreport essential information. While bringing numerous benefits, these systemscan be vulnerable to cyber threats and incidents, which have continued toincrease in recent years. Consequently, security considerations are essentialas the federal government invests over $80 billion in IT annually. Nick willdiscuss recent GAO reviews related to cybersecurity and IT acquisition anddevelopment, as well as steps agencies can take to bake security into systemdevelopment and risk management.

  • 9:45-10:00am

    Coffee Break/Networking

  • Breakout Session #1​ 10:00-10:45am
    Access Policy Manager (APM) 101 - Joe Grone, F5 Field Systems Engineer
    Introduction to F5 Authentication and Single Sign on solution, Access Policy Manager. Understand how APM secures and differentiates access to your applications, data, network, and the cloud based on user identity and context. Learn how to use BIG-IP APM to unify and enforce identity-based, context-aware, and policy-driven application access control—regardless of the location of the user or the application.
    SSL Visibility and Intercept - Ron Cochran, F5 Field Systems Engineer
    With federal mandates demanding SSL everywhere, there is a need to balance encrypting all of our traffic, while providing needed visibility for security solutions into what is traversing our network. This session will provide an introductory overview to F5’s SSL Intercept and Visibility Solution (SSLi). You will learn the basic concepts of SSL intercept, hear several use cases and architectures and discuss best practices when deploying an SSLi solution.
    F5 Hardening to Meet Federal Security Mandates - Michael Coleman, F5 Sr. Field Systems Engineer
    With F5 being deployed in most federal demilitarized zones (DMZs) it is important to understand how to lock down access and harden the Traffic Management Operating System (TMOS) to mitigate vulnerabilities, and meet your compliance requirements at the same time.
    F5 Virtualization and Government Cloud - Lyle Marsh, F5 Field Systems Engineer, Dung Lam, F5 Field Systems Engineer
    This session will focus on leveraging F5’s virtual edition and Big IQ management console too quickly and easily spin-up application services in private or public cloud environments. Virtual Editions offer on-demand deployment options for high-density and multi-tenant infrastructures, so you can make new applications available to users in minutes
  • 10:45-11:00am

    Coffee Break/Networking

  • Breakout Session #2​ 11:00-11:45am
    F5 Authentication Services - CAC/PIV - Michael Coleman, Sr. F5 Field Systems Engineer
    F5's Access Policy Manager (APM) is the the de facto standard for doing advanced authentication into secure environments. Understand how to leverage the F5 to CAC enable all of your mission critical applications.
    SSL Visibility and Intercept - Ron Cochran, F5 Field Systems Engineer
    With federal mandates demanding SSL everywhere, there is a need to balance encrypting all of our traffic, while providing needed visibility for security solutions into what is traversing our network. This session will provide an introductory overview to F5's SSL Intercept and Visibility Solution (SSLi). You will learn the basic concepts of SSL intercept, hear several use cases and architectures and discuss best practices when deploying an SSLi solution.
    F5 12.x Updates - Ryan Johnson, F5 Sr. Field Systems Engineer
    This session will provide an overview of the latest version of the F5 Traffic Management Operating System (TMOS) and the new features and enhancements available in version 12. You will learn which features will benefit your existing applications like Exchange Sharepoint, Oracle, etc.
    F5 Authentication Services in the Cloud - Office 365 - John Inscoe, F5 Field Systems Engineer
    Take advantage of the Cloud First Initiative by understanding how to use F5's Access Policy Manager (APM) to provide single sign on and access to 3rd party and web based applications like Office 365.
  • 11:45-12:45pm

    Lunch and Keynote
    Doug Babb, Chief IT Systems Architect, Hill AFB Enterprise Data Center, US Air Force

  • 12:45-1:30pm

    Panel Session: Managing Your Risk in an Encrypted World
    Lance Dubsky, Chief Security Strategist, FireEye
    Matt Schneider, Senior Director, VMware Network and Security (NSX) Business Unit
    Ronald J. Yearwood, Section Chief of the Cyber Operations Section III, FBI Cyber Division

  • 1:30-1:45pm

    Closing

*Agenda is subject to change

Speakers

Check back soon for speaker announcements and updates!

· Learn more · John Gilroy

Program Moderator

John Gilroy

Federal News Radio Host

· Learn more · Lance Dubsky

Panel Speaker

Lance Dubsky

Chief Security Strategist, FireEye

· Learn more · Doug Babb

Lunch Keynote

Doug Babb

Chief IT Systems Architect, Hill AFB Enterprise Data Center, US Air Force

· Learn more · Matthew G. Schneider

Panel Speaker

Matthew G. Schneider

Senior Director, VMware Network and Security (NSX) Business Unit

· Learn more · Nick Marinos

Morning Keynote

Nick Marinos

Assistant Director, GAO, Information Technology Audit Team

· Learn more · Ronald J. Yearwood

Panel Speaker

Ronald J. Yearwood

Section Chief of the Cyber Operations Section III, FBI Cyber Divison

Sponsors

The F5 Government Technology Symposium is proudly sponsored by:

Platinum Sponsors

Exhibitor Sponsors

Follow Us on Twitter

Carahsoft

Cybersecurity Solutions for Government

The dedicated Cybersecurity and Defense team at Carahsoft specializes in providing government agencies with a variety of solutions to secure the cyber ecosystem. Our trained and certified representatives have a thorough understanding of the government's cyber requirements and mandates, allowing us to accurately match our cybersecurity portfolio with our customers' specific needs.

Carahsoft has partnered with numerous technology providers to offer government entities proven, cost effective protection for critical networks and digital information. These solutions, all of which are available via our GSA schedule, are highlighted below and address federal, state, and local government requirements in the areas of: Security, Encryption, Continuous Diagnostics & Mitigation, Insider Threat, Security Intelligence, Database Security, and Proactive Defense.

Learn More

Get in touch

Please contact us with any questions or for more information about this event