Agenda



8:00 am

Speakers:
Co-Founder and Co-Chairman
ONUG
Chief Product Officer
Gluware, Inc.
Founder & CEO
DryRun Security
Conference Co-Chair
DevSecOps@ONUG Fall

Cloud providers are winning the hearts and minds of enterprise developers. Infrastructure and operational teams struggle to catch up. This gap is huge in a corporation’s ability to being digital. The ONUG Collaborative and its working groups are developing playbooks and tools to close this gap so that developers have a CI/CD pipeline that spans on- and off-prem, delivering choices and options to develop digital value at speed. Nick Lippis, ONUG Co-Founder and Co-Chair, shares how the ONUG Community is skilling up infrastructure teams and... Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG

9:00 am

Raytheon Technologies is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers, headquartered in Arlington, Virginia. It is one of the largest aerospace, intelligence services providers, and defense manufacturers in the world by revenue and market capitalization generating 64.39 billion USD (2021) revenues and employing some 174,000. Raytheon Technologies is an engineering powerhouse with some 60,000 engineers, which is more than double the size that Amazon employees! Raytheon is digitally transforming every aspect of its business from... Learn More
Speakers:
Corp VP, Enterprise Infrastructure Services
Raytheon Technologies
Cyber Executive of Global Banking
Bank of America
President
Cyber Aegis

10:00 am

Enterprise computing is multi-cloud computing; it’s hard, complex but promises control and choice for developer and infrastructure teams. Infrastructure teams are to make life easier for developers to write applications that deliver corporate digital value. Multicloud delivers the widest pallet of tools and constructs, but can developers use them all? Is multicloud too hard or are we just at the early stages of tool and operational model development? In this session we explore the realities of multicloud architecture implementation and operations. Learn More
Speakers:
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Corp VP, Enterprise Infrastructure Services
Raytheon Technologies
General Manager Public Cloud Transformation, Risk, Security, Compliance - IBM Cloud
IBM
CVP & CISO
FedEx

11:00 am

Aviatrix Intelligent Cloud Networking platform. Enterprise companies migrating business critical applications such as SAP S4/Hana to the cloud need business critical infrastructure. Learn why over 550 enterprise customers including 64 of the Fortune 500 use Aviatrix for their business-critical cloud or multicloud networking in AWS, Azure, GCP, Oracle and Alibaba clouds. This demo will show how Aviatrix delivers agility, availability, performance, security, enterprise-class visibility to support enterprise requirements. Learn More
Speakers:
Principal Solutions Architect
Aviatrix

Policy as code is the formalization of business intent and codification into software that can evaluate across multiple cloud providers and on-prem equipment. The code enforces policies within the infrastructure, with appropriate guardrails and within compliance guidelines and is foundational to the design and delivery of an automated continuous control framework Given the growing strategic importance of policy as code, to our members, the ONUG Collaborative established a Policy as Code Working Group during the summer. In this session, IT leaders who provided input to... Learn More
Speakers:
CEO & Co-Founder
Concourse Labs
SVP, Global Head of Network Automation and Telemetry
Bank of America
VP, Strategy & Transformation
IBM
Managing Director for Network Services
Citi
Head of Backbone Network Services
Citi
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Director, Cloud Risk and Compliance
Raytheon Technologies

The move to devsecops hasn’t been a smooth one in every organization. In fact if we are honest, the whole DevOps and Digital Transformation hasn’t been cupcakes and unicorns either. In this talk we discuss some warning signs and how to right the ship before its too late. If there is a session you might want to encourgage your boss to attend, this is it! Once you leave the session you’ll be armed with patterns to look for and some tips to make changes in... Learn More
Speakers:
Founder & CEO
DryRun Security
Conference Co-Chair
DevSecOps@ONUG Fall

Many large enterprises, especially in Financial Services and Healthcare industry verticals, grow through mergers and acquisitions (M&A). These acquisitions can generate an immense amount of work for IT teams in terms of assessing network infrastructure and bringing this into corporate standards and policy. Gluware simplifies and accelerates this work through their suite of no-code network automation applications. This demonstration will highlight how Gluware Intelligent Network Automation is used to discover the network infrastructure and device detail, assess the inventory, and then visualize and document it... Learn More
Speakers:
Senior Director, Product Management
Gluware

Modern enterprise IT teams are tasked with managing networks that are constantly in a state of transformation. These migrations are complex, requiring new types of visibility into applications, traffic flows, distributed locations, or include managing cloud workflows in order to maintain good end-user experience. Increasingly apps and network delivery paths are moving out of IT’s control, but remain IT’s responsibility when problems arise. AppNeta by Broadcom Software has been helping the largest enterprises in the world manage performance through these transformations. Join us to learn... Learn More
Speakers:
Head of Product Marketing
AppNeta by Broadcom

In today’s cloud delivered, work from anywhere, world there is a distinct need for consistent security policy enforcement from the edge across the WAN and to the cloud. At this session, come hear about the latest enterprise marketplace trends impacting edge-to-cloud security, and how HPE Aruba is leading the charge to help customers with visibility, control, and automation of network security across the enterprise and into any cloud. As one of only two vendors with MQ-leading connectivity solutions spanning the wireless and wired LAN, campus,... Learn More
Speakers:
VP, CTO FSI & Retail
Aruba, an HPE company

12:00 pm

The challenge of software security in a DevOps-driven world is enormous. The most effective place to give developer feedback and why it’s manyfolds effective than where most people are giving it today. As per one of the research 96.8% code on the internet is OpenSource. When Open Source is a major part of the code and whole DevSecOps. It becomes imperative to know the aspects of the open source’s usage, if the open source libraries are not used properly or updated on time, open source... Learn More
Speakers:
Chair of the Board of Directors
OWASP

The cloud is complex, as is the nature of cloud risk. What makes for a breach path is often multiple risk vectors that come together to create a toxic combination. Identifying, prioritizing, and remediating these toxic combinations are crucial for security teams. In this session, we share the top 5 toxic combinations that Wiz sees, explore why these stand out, and offer an approach to addressing them. Learn More
Speakers:
Principal Solutions Engineer, Global Channel & Alliances
Wiz

1:00 pm

The automated network is the platform for digital transformation. See how industry leader and visionary, Siji Atekoja, Deputy CIO/CTO at Ohio State University Wexner Medical Center, is utilizing Gluware intelligent network automation to transform operations, attract top talent, and achieve distinction and preeminent rank among national healthcare centers. Learn More
Speakers:
Deputy CIO/Chief Technology Officer
Ohio State University Wexner Medical Center
CEO
Gluware, Inc.

Current (3rd Generation) data center architectures lack a simple approach to include ML/AI in their network and security operations.  This session will look at how the 4th Generation Data Center Architecture fundamentally changes this by providing the telemetry required by different ML/AI solutions.  We will explore how these solutions improve network and security operations. Learn More
Speakers:
Director of Technical Business Development
AMD Pensando

In this session, hear from one of the world’s leading manufacturers of clean energy equipment and learn firsthand how they overcame cloud complexity, rapidly achieved segmentation and microsegmentation goals, and empowered their company to take on the cloud era with confidence using Alkira’s easy to use, revolutionary cloud networking platform. With Alkira, the organization’s IT leadership was able to reduce latency, increase performance, and gain unprecedented new levels of visibility into every aspect of their networking infrastructure, including a vast sprawl of IoT sensors and devices. Learn More
Speakers:
President, CEO and Founder
Alkira

2:00 pm

Traditionally, IT organizations have treated networking and security as separate priorities. However, a siloed approach is not working for businesses anymore.  Interoperability between dynamic network elements is essential. As is protecting transactions, applications, and workflows between devices that are constantly in motion.  Networks and security must evolve together to meet business demands. Learn more about Comcast Business’ perspective on network and security convergence, and the importance of an integrated approach within your businesses IT strategy.  Discover how Comcast Business and Masergy can help businesses, from... Learn More
Speakers:
Senior Director, Product Management Secure Networking
Comcast Business

3:00 pm

Multi-cloud is hard. Most corporations focused their application development efforts on the tools offered by a single cloud provider to start their enterprise cloud journey. As such their business operations become entwined with that cloud provider. Can a high level of intertwinement be replicated across multi cloud providers when each cloud provider offers different tools and constructs? In this session, we explore the reality of a multi-cloud strategy from those who are living with one. Learn More
Speakers:
Azure Squad Lead
Fidelity Investments
Distinguished Engineer – Product Infrastructure
Intuit
Vice President, Global Technology & Cloud Transformation
Evernorth, A Cigna Health Company

Security OF the cloud refers to the safety of the cloud itself, the vendor part. Security IN the cloud refers to the safety of the users, the customers that use those cloud services and manage resources in the cloud. In this talk, you’ll learn how to be prepared for a security incident with existing tools and procedures. We’ll cover general concepts related to AWS, Azure and GCP as well as give examples of specific AWS threats in detail. Learn More
Speakers:
Founder of Prowler Open Source and Lead of ProwlerPro
ProwlerPro

The enterprise shift to a cloud-native environment is driving an evolution in how enterprises access data and digital applications.  The traditional approach to individually managed network functions, and virtualizing functions on uCPE, is giving way to virtual network functions in the near edge cloud.  But in this environment, how do enterprise network teams ensure orchestration, visibility, and control of cloud-based network workloads?  How can they reduce the complexity and potential cost of moving network functions into the edge cloud?  Join our panel discussion to hear... Learn More
Speakers:
Senior Advisor, Edge Virtualization and Vertical Solutions Marketing
Ciena
Director Edge Virtualization Sales and Strategy
Ciena
Consultant, Field Systems Engineering
Ciena
Director, Innovation & Strategy Advisory
AT&T Business Solution
Director, Systems Integration Product Management
Ciena

4:00 pm

As the number of networked sensors soar, so too does the requirement for edge computing and network edge breakout to solve the latency and direct access for sensor response. This is the first infrastructure built for non-humans as Robots as a Service (RaaS) becomes a reality. Many infrastructure teams are reviewing build vs buy decision. The edge is a combination of 5G, data, sensors, cloud service providers, OT/IT security convergence, etc. In this session, we sort out the edge computing and network breakout stack so... Learn More
Speakers:
CEO and Founder
Nemertes Research
Technical Director, Global Network Architecture
FedEx
Head of Global Network Architecture, Engineering & Automation
Johnson & Johnson Healthcare
CEO
Pratexo

Given the growth and adoption of Kubernetes, a number of projects have been published in the OWASP community to help practitioners assess and secure the security of their containerized infrastructure including the recently released Top Ten for Kubernetes (https://owasp.org/www-project-kubernetes-top-ten/). This OSS project is a community-curated list of the most common Kubernetes risks backed by data collected from organizations varying in maturity and complexity. This session will discuss the project in detail, examples for each of the risks in the list, and how you can get... Learn More
Speakers:
Co-Founder and CTO
KSOC

5:00 pm

Join us for a Networking and Cocktail reception from 5:00-6:30 on the expo floor. Learn More
Speakers:

8:00 am

Speakers:
Co-Founder and Co-Chairman
ONUG
Chief Product Officer
Gluware, Inc.
CEO and Founder
Nemertes Research
Founder & CEO
DryRun Security
Conference Co-Chair
DevSecOps@ONUG Fall

9:00 am

How does a graduate of Chemical Physics wind up working in the Pharma, Oil, Telecom and Financial Services Industry then end up becoming a board member of multiple public and private companies and advisor to many different kinds of software startups? Andy Brown of Sand Hill East will talk about his career journey and the evolving relationship between developers and infrastructure teams over this time span. Andy’s career is a model of personal and corporate achievement that highlights the value creation power IT executives have... Learn More
Speakers:
CEO
Sand Hill East, LLC
Co-Chair
AI Networking Summit

You will learn about the CSNF Starter Kit and how the CSNF Framework continues to enrich the Canonical Data Model as we push towards V1.0. During this session we will be discussing the incredible flexibility of the framework, how it operates with other emerging standards in the proprietary third party space, while specifically addressing the toil experienced by the SecOps community. Learn More
Speakers:
Principal Product Manager, Cloud Security
Microsoft
Sr. Director, Cloud Security Strategy & Engineering
Evernorth, Evernorth, A Cigna Health Company
Field Chief Security Architect
Oracle

10:00 am

Connecting remote workforce employees was straight forward, but the biggest challenges now is that nobody wants to come into the office. How do executives incentivize employees to come in, at least once in a while, and keep them engaged, keep them feeling part of a team, keep them employed with your company? What are the strategies to inspire workforces through technology? How do you make sure that people’s voices are heard? How do you build collaboration capabilities that enable people to be just as efficient... Learn More
Speakers:
Vice President, Global Technology & Cloud Transformation
Evernorth, A Cigna Health Company
Director, Digital Workplace Engagement and Success
Raytheon Technologies
Chief Information Security Officer
Collins Aerospace

A new wave of transformation is being propelled by the increased adoption of 5G and the corresponding changes to how businesses connect with their employees, customers and partners. Traditional networking infrastructure hinders the reach and agility that an organization can provide, especially as people and devices move outside of the traditional WAN boundaries. Learn how the new connected enterprise embraces the freedom of 5G and how technologies such as SD-WAN, SASE, and Wi-Fi are changing and converging enable this change business models, provide greater resiliency,... Learn More
Speakers:
Sr VP of Marketing
Cradlepoint

11:00 am

“Shift Left” and automation have turned from ideals to meaningless buzzwords. Instead of riding the hype train, let’s get real and cover practical and real-world examples taken from actual product security successes. Not every business is the same, neither will their DevSecOps program. In this talk, I’ll cover the fundamentals of common to successful DevSecOps programs as well as a grab bag of useful techniques to consider. These are lessons learned doing AppSec at a wide variety of companies including Rackspace, Pearson, a fortune 500... Learn More
Speakers:
CTO
DefectDojo Inc.

Over the past decade, “Zero Trust” has become the dominant conceptual framework guiding enterprise cybersecurity thought leaders and practitioners. In this session, members of the Cloud Native Security Working Group explore the essential principles of the Zero Trust mindset and discuss practical approaches for achieving success on the cyber defense barricades. Learn More
Speakers:
Technology Industry & IT Consulting Executive
Renaissance Tech & Media
Information Security Advisor
FedEx
Chief Executive Officer and Co-Founder
Stealth Startup
President
MarketWord, Inc.
Senior Architect, Office of the CTO, Security Products
F5
SVP, Research and Consulting
Nemertes Research

We spend our days on voice and video conferencing and performance is a constant struggle, especially with the rise in popularity of hybrid work. With apps like Microsoft Teams hosted outside of traditional infrastructure how can you get actionable insight to solve issues faster or quickly isolate the root cause–even if it’s outside your sphere of influence. Join AppNeta by Broadcom Software to see what active monitoring can do for these key apps that enable business-critical collaboration. Speed up MTTR or prove your innocence when... Learn More
Speakers:
Head of Product Marketing
AppNeta by Broadcom

12:00 pm

Today’s enterprise networks are complex – spanning physical, virtual, and multi-cloud infrastructure – resulting in increased demand to deliver applications and services faster, thereby increasing the rate of changes to the network. To meet these demands, many network teams use NetBox as a source of truth to help organize, document, and manage critical network resources and configuration as a logical first step. However, it’s not enough to just know what’s in your network. To really overcome these challenges at scale, network teams must also incorporate... Learn More
Speakers:
Sr. Technical Marketing Engineer
Itential
Technical Advocate at NS1
NetBox

As more companies adopt the cloud, there is an expanding need for new cloud-native security tooling that can help organizations secure their cloud environments in order to achieve the promise of the cloud without exposing themselves to breaches and without slowing the business. As more and more technologies and architectures are brought into the cloud in pursuit of innovation and growth, so too does the nature of cloud risk grow and become more complex. Wiz is the industry’s first agentless, graph-based approach to cloud security.... Learn More
Speakers:
Senior Director of Product Marketing
Wiz

Trying to figure out how to chart your career in Enterprise IT? Learn from those who have navigated the industry in this unique ONUG mentoring session. Hear from ONUG Power Players and thought leaders who are at the top of their game as they share their career paths, choices and offer advice for entering the enterprise tech job market or expanding your career. They’ll provide their vision for the direction of the industry and how to navigate enterprise tech careers. Learn More
Speakers:
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Chief Technology Officer
Fannie Mae
General Manager Public Cloud Transformation, Risk, Security, Compliance - IBM Cloud
IBM
VP, Digital Workplace & Employee Experience
Raytheon Technologies
Chief Information Security Officer
Collins Aerospace

1:00 pm

Experience is the new benchmark for network operations today. This is due to the proliferation of cloud migrations, SaaS adoption and the increase in work from anywhere. But how do you gain visibility into the user experience when it traverses over networks you do not manage – like ISPs? Join this session to learn from industry analysts and real world users of digital experience network monitoring solutions from Broadcom to learn how they prioritize experience impact of network performance over non-business related up/down issues in... Learn More
Speakers:
VP of Research Network Management
Enterprise Management Associates (EMA)
Chief Technical Evangelist - NetOps
Broadcom
Head of Global Network Architecture, Engineering & Automation
Johnson & Johnson Healthcare
Director of IT - Site Operations
Results-CX

Join Guru Ramamoorthy, VP, Global Head of Network Architecture, Engineering & Operations at S&P Global, to learn about their business use cases that are driving the need for a multi-cloud network digital twin, and the real-life ROI they have realized since deploying Forward Enterprise. Specific use cases include: efficiently integrating new networks (on-prem and cloud) post-merger, enabling developers to search for network information to make important decisions (similar to Google search functionality), and fast-tracking the cloud migration journey. Learn More
Speakers:
VP, Global Head of Network Architecture, Engineering & Operations
S&P Global

Every day enterprises move apps to the cloud for reasons including the ability to innovate more quickly, addressing urgent capacity needs, and overhauling infrastructure. Still, legacy network designs are holding them back. Learn how integrating zero trust principles into enterprise cloud architecture design can help reduce complexity and accelerate cloud adoption, particularly as enterprises grapple with multi-cloud environments. Learn More
Speakers:
Director, Transformation Strategy
Zscaler

2:00 pm

Today, applications and data are everywhere, and the concept of work has been transformed from a place we go to something we do, anywhere at any time. Point products, VPN, and trusted network zones no longer provide adequate protection but instead introduce risk. The industry tried to fix secure access with Zero Trust Network Access (ZTNA), but first-generation solutions were disjointed and incomplete. Securing our new reality of hybrid work requires a fresh approach to ZTNA that doesn’t repeat the mistakes of the past Learn More
Speakers:
Vice President of Marketing
Palo Alto Networks

During 2022, more than $1.3 Trillion in enterprise IT spending will shift to the cloud, and yet cloud spend will not outpace legacy services spend until 2025. Most companies will continue to run both traditional Data Center infrastructure as well as cloud-based services for many years, and yet no one can afford to double their operating budget in support of this transformation. As a result, many companies are now launching FinOps programs to help manage and govern fast growing cloud expenses, including the tremendous ‘bubble... Learn More
Speakers:
Founder & CEO
Strongbow Consulting Group
Managing Director, Infrastructure and Operations
Blue Cross & Blue Shield of Rhode Island
Vice President, Global Technology & Cloud Transformation
Evernorth, A Cigna Health Company
Former CTO
Hudson's Bay Company

5:00 pm

Speakers:
Co-Founder and Co-Chairman
ONUG
Chief Product Officer
Gluware, Inc.
Founder & CEO
DryRun Security
Conference Co-Chair
DevSecOps@ONUG Fall