F5 Government Technology Symposium


Keynote Sessions

  • Cloud Computing - Should It Have a Warning Label?

    John Keese, SVP, Enterprise Analytic Cloud Platforms, Intellicog, Former Director of Government Cloud Services, CSRA, and Past President and Founder of Autonomic Resources

    The federal cloud movement is well beyond the much referred to "Cloud First" policy. In the case of cloud, it is no longer a journey, but arguably a destination. In this keynote we will attempt to address some of the key elements of cloud services agencies and missions should now look for and expect from our cloud providers, technology partners and a the role of the systems integrator moving forward. Areas discussed: APIs, cloud compute utilization, private to public integration, vetting the vendors, expecting more from the SI, and some trends that are emerging.

  • Today's Cyber Threats

    Matthew Braverman, Supervisory Special Agent, Washington Field Office, FBI

    This session will review recent real-world FBI cyber crime investigations affecting U.S. companies. We will discuss the tactics, techniques, and procedures of the associated attacks, especially those impact cloud infrastructure. SSA Braverman will also discuss best practices that have been effective in preventing, detecting, and remediating recent cyber intrusion trends.

  • IoT: The Hidden Threat in the Cloud

    Lori MacVittie, Principal Technical Evangelist, F5 Networks

    IoT is inevitable, as is cloud. The legions of Thingbots built from insecure devices grows with every new gadget and gizmo, available to every miscreant and hacktivist with a credit card. The threat is real, but don't let it distract you from the hidden threat of IoT apps as they move into the cloud.

*Agenda is subject to change


Breakout Sessions

  • Rise of the Bots

    Brian McHenry, Security Solutions Architect, F5 Networks

    Security, performance, and availability are converging like never before. Nowhere is this more evident than in the seemingly unending waves of DDoS attacks. What all of these attacks have in common, whether targeted at the carrier networks or application servers, is the use of automation by attackers.

    For years, we have been told to scan for and patch vulnerabilities. Yet, we are still getting DoS'd and worse yet, breached. Identifying Botnets and other automated traffic dynamically has a far greater impact by shrinking the threat model and reducing traffic load.

  • SSL Orchestration

    Ryan Johnson, Senior Systems Engineer, F5 Networks

    With federal mandates, like PULS.CIO.Gov demanding SSL everywhere, there is a need to balance encrypting all of our traffic, while providing needed visibility for security solutions into what is traversing our network. This session will provide an introductory overview to F5’s SSL Orchestration. You will learn the basic concepts of SSL orchestration, understand how to create a security service chain, and leverage Cipher Diversity to meet your organizational goals. Hear several use cases and architectures and discuss

  • Hardening the F5 to Meet Federal Mandates

    Michael Coleman, Senior Systems Engineer, F5 Networks

    With F5 being deployed in most federal demilitarized zones (DMZs) it is important to understand how to lock down access and harden the Traffic Management Operating System (TMOS) to mitigate vulnerabilities, and meet your compliance requirements at the same time.

  • Securing Office 365

    John Inscoe, Field Systems Engineer, F5 Networks

    Learn from a real world example of how the US Military is utilizing F5 to help secure its access to Office 365. Take advantage of the Cloud First Initiative by understanding how to use F5’s Access Policy Manager (APM) to provide single-sign-on and access to not only Office 365, but other 3rd party cloud applications.

  • Thought Leadership: DoD Network Campaign Plan

    Michael Coleman, Senior Systems Engineer, F5 Networks

    This session will be an overview of leveraging advanced features like CAC/PIV authentication, single-sign-on, F5’s Web Application Firewall, and other security features to secure critical applications in one of the largest IT infrastructures in the world.

  • Version 13.0 Updates and Introduction to the iSeries and Herculon Platforms

    Robert Smith, Senior Systems Engineer Manager, F5 Networks
    Brad Otlin, Field Systems Engineer, F5 Networks

    This session will focus on the latest operating system from F5 version 13, as well as our new iSeries platform and purpose built Herculon security appliances. Learn the latest features of the 13.0 operating system as well as understanding the new hardware profiles available in the i-Series.

  • Maintaining Security and Controls in the Cloud – Cloud Adapter and Cloud Orchestration

    Dung Lam, Field Systems Engineer, F5 Networks
    Eric Chen, Regional Architect, F5 Networks

    The session will focus on the new cloud solutions from F5. We will discuss how to deploy common F5 services using current templates from Github into an AWS or Azure cloud. We will also discuss the benefits of leveraging a hybrid cloud solution and cloud orchestration to prevent “cloud lock in” by using F5 in conjunction with Equinix to provide high speed access to the cloud of your choice.

*Agenda is subject to change