ONUG Fall 2023 Agenda



8:00 am

We’re kicking off the ONUG Fall 2023 Conference with a speed dating approach to the day ahead. Nick Lippis, Johna Till Johnson, Maria Scarmardo and others will ensure you get the most value for your time spent at ONUG by breaking down session topics, interviewing sponsors and industry executives, and providing critical insights into the rapidly changing landscape of Networking, Enterprise Cloud, Security and DevOps. Don’t miss this pre-game and the exciting day ahead at ONUG Fall. Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
CEO and Founder
Nemertes Research
Founder
Praxis Data Security

In this vital ONUG Keynote, Nick Lippis and Dr. Alex Shulman-Peleg will map out the rapidly evolving landscape of Network and Security technology and teams. They will articulate how these traditionally separate domains are fusing to form an increasingly potent force to hasten business value creation and fortify infrastructure trust by building, running and integrating cloud infrastructure with on-premise systems/controls. Agenda: -Overview of the transforming landscape of Network and Security teams and Operational Centers -Discussion on the integration of operations and infrastructure for enhanced cost-efficiency... Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
EY Americas Cloud Cybersecurity Leader, Managing Director
EY

9:00 am

Digital transformation and Industry 4.0 drive radical change in OT (Operational Technology) environments, creating ‘hyperconnected’ process control systems fully embedded into a cloud-enabled, integrated supply chain. Total connection of OT enables significant uplift in process efficiency, flexibility and optimization, and the market for OT and related IoT and Cyber-Physical devices is expected to be 5x the market for IT devices. Integrating these assets into the broader corporate infrastructure presents unique challenges for which GSK has developed a new technology termed Dynamic Edge Segmentation. Through this... Learn More
Speakers:
SVP, Global Chief Information Security Officer (CISO)
GSK
Snr Director, OT Cyber Security
GSK
Security Consultant
GSK
Senior Director, Global Connectivity
GSK

We would like to thank Michael Elmore of GSK and his staff to celebrate his and GSK’s ONUG Community contribution in moving digital transformation forward via hosting this ONUG Fall 2023. GSK shared one of the most important deployments that many are struggling with, that is how to gain efficiency by integrating OT and IT infrastructure securely. We thank you for your strong thought leadership and support of the community. We also want to express our gratitude to Michael Elmore’s staff especially Susan Berce who... Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG

With the digital age came an exponential transformation in compute and networking landscapes. As enterprises shifted from bare metal servers to server virtualization, and ultimately, to cloud-based IaaS and PaaS, enterprise networking experienced a parallel evolution. We progressed from traditional router-based WAN connections and embraced Software Defined Networking (SDN). However, the journey doesn’t stop there. Today, we stand at the cusp of a new era where the Network becomes the Cloud, paving the way for Network Cloud services. This pivotal transformation brings forth the emergence... Learn More
Speakers:
CEO and Founder
Nemertes Research
CEO and Co-Founder
Graphiant
Assistant Vice President – Managed, Transport, Edge & Cloud Services
AT&T Services Inc.
Director Solutions Architecture
Verizon Business Group

10:00 am

Leverage the power of encrypted jumbo frames to accelerate your cloud workloads. Learn More
Speakers:
CEO and Co-Founder
Graphiant
CEO
PacketFabric

InfiniBox is a platform built from the ground up to enable AUTOMATION of all functions of the system. When dealing with petabytes of critical data, that is ever changing, it is imperative you have a framework that allows for automating all aspects of your data life cycle. Infinidat provides you that framework in the form of SnapSync. SnapSync is an application instance management solution that take the time-consuming and complex process of duplicating your production environment and simplifies it into a simple set of commands.... Learn More
Speakers:
Principal Systems Engineer
Infinidat

In this session, we will delve into the transformative capabilities of the Nautobot Device Lifecycle Management App, highlighting how this powerful tool can empower you with invaluable insights into your device infrastructure, encompassing hardware, software, and security. We will explore how this app seamlessly automates the ingestion of vital notices from vendors and standards bodies, such as hardware and software end-of-life and support notifications, as well as Common Vulnerabilities and Exposures (CVEs). This automation generates comprehensive reports detailing your entire inventory, enabling you to make... Learn More
Speakers:
Senior Sales Engineer
Network to Code

AI/ML brings numerous benefits to businesses and their digital infrastructure operations. Explore how a modern DC router integrated with AI tools like ChatGPT can speak your language to make enterprise network operations remarkably easy and effortless. This PoC showcases an innovative and groundbreaking market first implementation of ChatGPT integration with routers. The powerful capability of managing routers in every day natural language enables users to proficiently and efficiently perform daily operational tasks. Learn More
Speakers:
DIrector, Data Center Switching Business Development
Nokia

11:00 am

As told by FIS, this financial company works with 95% of the world’s leading banks and supports more than one million merchants around the globe. Join Keith Fiala, Senior Systems Manager, FIS as he shares how DX NetOps and AppNeta help FIS get to root cause faster both inside and outside of the four walls of the datacenter so they can deliver the services that the world depends upon. Learn More
Speakers:
Chief Technical Evangelist - NetOps
Broadcom
Senior Systems Manager
FIS

Are outdated firewalls causing operational complexities and budgetary challenges for your cloud teams? This session will explore how leading enterprises tackle these challenges through an innovative distributed cloud firewall strategy. Enterprises are discovering substantial cost efficiencies, ranging from tens of thousands to millions of dollars annually, all through the power of a distributed cloud firewall approach. A zero-trust network architecture driven by policy-as-code bolsters cyber resiliency and reduces business risk. Understand why customers say it’s a game-changer and security analysts view it as an opportunity... Learn More
Speakers:
Head of Security Solutions
Aviatrix

12:00 pm

What does Securing Any Application on Any Cloud entail? It means scanning and securing the infrastructure and application code, protecting the application’s interactions and APIs, guarding against malicious intent, ensuring access to users and devices while continually verifying their identity and authorizations, and more. Join us to experience the latest in the Fortinet Security Fabric. Broad. Integrated. Automated. Learn More
Speakers:
Senior Cloud Devops Engineer
Fortinet

The Private 5G Event will kick off with a leading wireless industry analyst presenting an overview of the global market for private 5G networks and projections for future growth. What are the key business drivers and compelling benefits for enterprises deploying private 5G networks? How can private 5G enable new applications and use cases underpinning enterprise digital transformation initiatives? What are the technical issues governing adoption? Private 5G promises to be a real enterprise game changer. Attend this session to learn why. Agenda: -Overview of... Learn More
Speakers:

Our in-depth exploration into Network-as-a-Service (NaaS) will illuminate its diverse use cases and versatile deployment options, emphasizing the pivotal role of network engineers in shaping next-generation enterprise technology and cloud strategies with NaaS. We will delve into how NaaS is reshaping the network landscape, enabling businesses to achieve greater flexibility, scalability, and operational efficiency. Agenda: -Introduction to Network-as-a-Service (NaaS) -Exploring Diverse Use Cases of NaaS in the Enterprise Environment -Evaluating NaaS Deployment Options: Best Practices and Considerations -The Pivotal Role of Network Engineers in the... Learn More
Speakers:
Vice President, Global Technology & Cloud Transformation
Evernorth, A Cigna Health Company
Managing Director for Network Services
Citi
Global Head of Telecommunication Services
HSBC
VP, Strategy & Transformation
IBM

CloudQuery is a high-performance data integration frameworks built for developers. CloudQuery extracts, transforms, and loads configurations from multiple sources including CSPs such as AWS, Azure, and GCP to a variety of supported destinations such as databases, data lakes, or streaming platforms for further analysis. By loading infrastructure data to supported destinations like PostgreSQL, Snowflake, and others, CloudQuery enables customizable and bespoke insights that do not require vendor-specific language and enables multiple use cases including compliance, security, cost optimization, and infrastructure management. CloudQuery supports multiple compliance... Learn More
Speakers:
Head of Security Research and Solutions
CloudQuery.io

1:00 pm

The Cloud Native Security Working Group has developed a practical handbook for “Building a Zero Trust Security Practice”, which takes practitioners from essential principles such as “Never Trust, Always Verify”, “Assume Breach”, and “Least Privilege” to a set of concrete operational practices that bring these notions to life. Validated by first-hand experience at a global Fortune 100 company, these practices are attainable – and necessary – to safeguard critical enterprise assets in a world where cyber criminals loom as an ever-present threat. Attend this session... Learn More
Speakers:
Technology Industry & IT Consulting Executive
Renaissance Tech & Media
SVP, Research and Consulting
Nemertes Research
President
MarketWord, Inc.
Senior Cloud Devops Engineer
Fortinet

This panel discussion features representatives from wireless service providers, equipment vendors, system integrators and large enterprises, who will describe a wide range of compelling use cases for private 5G across a number of key industry verticals, such as agriculture, energy, healthcare, industrial and manufacturing, transportation and warehousing. Attend to learn why private 5G networks are an ideal solution for mobile connectivity in environments featuring highly mobile users, IoT devices and connected smart machines such as robots, autonomous guided vehicles and drones. Agenda: -Highlighting the advantages... Learn More
Speakers:
Managing Director for Solution Architects
Verizon

Organizations make decisions to move apps and services to the cloud without fully taking into account the impact on end-user experience. IT is still responsible for performance even though hybrid infrastructures introduce more physical and logical distance between users and apps. Traditional monitoring approaches can’t provide the insights required to isolate issues for cloud apps and networks that run your business. Broadcom is a leader in the use of active monitoring–both web and network–to reduce the mean time to resolution for IT teams. Join us... Learn More
Speakers:
Head of Product Marketing
AppNeta by Broadcom

As network complexity increases, automation will play a key role in ensuring reliability across enterprise networks. Yet, despite the number of new network automation tools on the market, Gartner estimated only 22% of companies had any network automation. One reason automation isn’t taking off? The massive effort it takes to gather the inventory of your network, and to ensure that data is accurate. A network source of truth like NetBox Cloud gives network teams at least one easy button in this regard. It provides a... Learn More
Speakers:
Technical Advocate
NetBox Labs

Traditionally, network management processes have seen the network as a series of individual devices connected together to provide services to users and deliver applications. Manual processes are centered around managing, maintaining and monitoring those devices and their interfaces and ensuring that they are behaving as we would hope. The level of understanding that is needed to translate this device-centric view into meaningful network insight is significant. Network Assurance takes a different approach – discovering the network, its config, state and topology, then creating a data... Learn More
Speakers:
Global Director of Product and Solution Architecture
IP Fabric

As the enterprise WAN completes the final step of its evolution from ‘Cloud-Ready’ to ‘Cloud-Centric’, one of the last remaining hurdles is rehoming the local access connections on the cloud. Traditionally these local access links are homed on a carrier POP (Point of Presence) integrated with their MPLS network. In this Proof of Concept, see how Open Access simplifies the transition away from expensive, datacenter-centric MPLS links, toward a cloud-centric WAN, while maintaining the speed, reliability, and security of private networking. Once edge sites are... Learn More
Speakers:
VP, Product and Solutions Engineering
Apcela

World Wide Technology’s (WWT) Advanced Technology Center (ATC) is the engine behind the ONUG Fall 2023 “Cybersecurity Space Jam”. The custom-built cyber range activity will test the skills and knowledge of SOC teams in a series of real-world cybersecurity threat scenarios often faced in hybrid multi-cloud enterprise computing. This hands-on, entertaining gameplay provides a glimpse into the company’s in-house training provided to security practitioners and IT professionals to sharpen their vigilance in an ever-evolving threat landscape. Learn More
Speakers:
Principal Systems Engineer
World Wide Technology

Join us for an enlightening 30-minute session with Richard Julian, a leading expert in the field of container security and incident response automation. In today’s fast-paced digital environment, container security can be a daunting task that organizations address as a checklist item. As businesses increasingly rely on containers to manage their applications and data, the potential for security incidents increases. In this session, Richard will delve into the challenges of teaching container security and show strategies for taking an engineering approach to both learning, but... Learn More
Speakers:
Consultant
ThatCloudGroup

2:00 pm

Fortinet Security responds dynamically to changes in the cloud environment and interacts with cloud native tools to effect changes required to maintain a continuous posture of protection and prevention. Join the PoC to witness Fortinet Security Automation in action. This PoC includes dynamic responses to cloud environment changes through FortiGate Automation Stitch triggers and actions, utilizing Webhooks to launch Cloud functions to securely segment and route, cloud process and traffic. Learn More
Speakers:
Senior Cloud Devops Engineer
Fortinet

Graphiant will be showing Cloud Connectivity with Jumbo Frame. Graphiant is a Silicon Valley-based provider of next-generation Edge services. Led by Khalid Raza, the co-founder of SD-WAN pioneer Viptela, Graphiant has developed the Graphiant Network Edge. This “as-a-Service” solution provides connectivity between the enterprise WAN, hybrid cloud, network edge, customers, and partners. Graphiant’s Network Edge combines MPLS-like performance (speed, scale, and security) and the as-a-Service agility that enables network architects to build enterprise-grade networks at the speed of business. Learn More
Speakers:
Principal Sales Engineer
Graphiant

Join us as we delve into the inner workings of Defect Dojo, an industry-leading vulnerability management tool, elucidating why it’s indispensable for cybersecurity professionals in the enterprise realm. This informative session promises to provide a comprehensive understanding of Defect Dojo’s capabilities and its profound implications for strengthening cybersecurity frameworks in today’s complex digital environments. Agenda: -Introduction to Defect Dojo: A Primer -Unpacking Defect Dojo: Key Features and Functionalities -The Role of Defect Dojo in Vulnerability Management -Real-World Application: Case Studies of Defect Dojo in Action... Learn More
Speakers:
Technology Industry & IT Consulting Executive
Renaissance Tech & Media
Global Co-head IT Risk & Security Practice
Synechron Consulting
Developer Support Account Manager
Microsoft

In this engaging session, we will discuss the critical role of connectivity in modern businesses, highlighting the challenges of managing highly distributed IT environments and the necessity of reliable access to mission-critical applications. We’ll delve into the concept of Network-as-a-Service (NaaS) as a transformative solution, demonstrating how it can simplify the cumbersome process of building Extranets, mitigate security risks, and ensure seamless, on-demand connectivity for B2B customer, partner, and supplier interactions. Agenda: -The Role of Connectivity in Today’s Businesses -Challenges in Managing Highly Distributed IT... Learn More
Speakers:
Vice President Technology, Chief Technology Advisor
World Wide Technology
Technical Director, Global Network Architecture
FedEx
Head of Backbone Network Services
Citi

Cisco TrustSec (CTS) offers a great way to operationalize microsegmentation in enterprise networks. Initial deployment and ongoing management can be time-consuming and error-prone due to the many moving parts. See how Gluware automation can streamline onboarding a network of switches and wireless controllers, using a combination of API calls and CLI configuration via SSH, following an easy-to-use workflow, ensuring the proper configuration is applied to Cisco’s Identity Services Engine (ISE) and to every network device to establish a baseline CTS environment. After initial onboarding, we... Learn More
Speakers:
VP of Security
Gluware
CSO and Co-Founder
Gluware

Riverbed Alluvio captures full-fidelity user experience, application, and network performance data on every transaction across the digital ecosystem. It then contextually correlates disparate data streams (including third party data) to quickly provide actionable insights and automate investigative workflows, empowering staff at all skill levels to solve problems fast. This presentation will discuss the benefits of a unified observability platform that automates the best practices of IT experts, empowers staff at all levels to accelerate problem-solving, eliminates data silos, reduces alert fatigue, and avoids resource-intensive war... Learn More
Speakers:
Senior Solutions Architect
Riverbed

This panel will feature a large enterprise that has successfully deployed a private cellular network in CBRS spectrum and will include CBRS experts from wireless service providers, equipment vendors and system integrators. Citizens Broadband Radio Service (CBRS) operates in the 3.5 GHz band and provides access to this shared spectrum using a three-tier model that ensures access for incumbent users (primarily the U.S. Navy) while providing for the purchase of Priority Access Licenses (PAL) that are granted priority over the lowest, shared-access tier: General Authorized... Learn More
Speakers:
CTO
5G Open Innovation Lab

As enterprises continue their pace of digital transformation via cloud adoption, many are approaching the tipping point where more applications are hosted in the cloud than on-premises. When the cloud becomes the center of data and application gravity, it’s no longer sufficient to simply extend a traditional WAN architecture to the cloud. The Cloud-Centric WAN abstracts the network from the confines of traditional hardware-bound architectures, and seamlessly integrates with the cloud’s inherent flexibility, unleashing unprecedented levels of agility, scalability, and efficiency by leveraging Software-Defined Networking... Learn More
Speakers:
CEO
Apcela

In this session, we’ll examine how AutoCloud can help companies adopt and scale Infrastructure as Code (IaC) by automatically generating secure, production IaC using low-code and AI automation. Transform entire cloud environments into Terraform code with the click of a button and quickly create an entire marketplace of self-service cloud development capabilities. Learn More
Speakers:
CEO
AutoCloud

3:00 pm

Grokstream’s mission is to help our customers detect service-impacting issues as early in their lifecycle as possible, and then help them prevent and/or resolve the underlying problems as quickly as possible. Grok is a second-generation AIOps platform. There is a lot of skepticism in our space around the words artificial intelligence (AI). That’s because many of the first-generation platforms marketed heavily to the term “”artificial intelligence””, but after years of adoption, their customers realized that they still had teams of people writing and building rules... Learn More
Speakers:
President & COO
Grokstream

In this PoC, we’ll be discussing how simple misconfigurations drive the broad number of breaches in cloud. With the pace of change in cloud, finding the balance between speed and security for enterprises is challenging. Existing toolsets are focused on detection and response which creates an alert fatigue problem in itself. There is another way — preventive cloud security. We’ll be exploring how a simple set of cloud security non-negotiables can greatly minimize risk in cloud and stop breaches before they happen helping you Secure... Learn More
Speakers:
VP - Operations
Kivera

Full-Stack Analytics explores the essence of implementing cross-layer, multi-domain analytics, emphasizing the need for an integrated platform that combines endpoint and network security telemetry for holistic threat detection. We’ll explore the transformative role of AI and machine learning in bolstering real-time intelligence across multiple layers and domains, enhancing predictive analytics and anomaly detection. Agenda: -Introduction to Full-Stack Analytics AI: Understanding the Necessity -The Cybersecurity Gap: Need for a Unified Platform Solution -Unveiling the Network Canonical Data Model (NCDM): Standardizing Data for Unified Analysis -Operational Requirements... Learn More
Speakers:
Chief Product Officer
Gluware, Inc.
Technical Director, Global Network Architecture
FedEx
Head of Technology
Nokia
Chief Technical Evangelist - NetOps
Broadcom
Sr Manager Product Manager
F5

Dell Enterprise SONiC supports the installation, management, and upgrade of third-party Docker containers. The third-party container (TPC) feature allows you to install third-party components as containers that are loaded and integrated as part of the SONiC system without having to rebuild the Enterprise SONiC image. The TPC feature provides a mechanism to install and manage custom Docker containers in the SONiC operating system. The TPC feature supports the following operations in a third-party container life cycle: ● Download and install a Docker image. ● Pull... Learn More
Speakers:
Advisory Network Systems Engineer
Dell Technologies

Digital transformation has led to an intensely challenging and dynamic attack surface comprised of IT, multi-cloud, IoT, edge, OT and BYOD. These threats, regulations and boards continue to escalate pressure on security leaders to measure and communicate cyber exposure. In this session, we will detail the 5 critical pillars of a successful cyber exposure management program, and how they can be achieved. We lay the foundation with the golden rule of security: ‘There is no security without complete asset visibility’ – detailing how to construct... Learn More
Speakers:
Territory Manager, Cloud & Identity Security
Tenable

As networks continue to increase in complexity, exposure and volume, companies are increasingly being scrutinized with recently established data privacy and security laws. In a data breach event it is challenging to provide an accurate assessment whether the number of consumers affected are thousands or millions. Without an accurate estimate the penalties are typically based on the higher number. In this PoC we will explore how Quantea provide ways of minimizing that number through use of network forensics. Learn More
Speakers:
CTO
Quantea

Zscaler Zero Trust Branch Connectivity replaces complex site-to-site VPNs or SD-WANs. It secures enterprise networks using the Zscaler Zero Trust Exchange, while eliminating exposed VPN ports and preventing lateral threat movement. The lightweight plug and play Branch Connector appliance provide secure connectivity for IoT/OT devices, applications, and unauthenticated users in branch offices, retail outlets, factories, and medical facilities without requiring additional firewall or SD-WAN appliances. In this proof of concept (POC), we will demonstrate how communication between unauthenticated endpoints (IoT/OT) and applications on the internet... Learn More
Speakers:
Senior Product Manager
Zscaler

Purpose-built IoT security is critical for modern enterprises that utilize an ever-expanding array of web-connected devices and equipment. In this session, Mark Elliott, the Director of Solutions Engineering at Asimily, will discuss how enterprises can build a modern incident response program using the Asimily platform, which ensures security, vulnerability management, and compliance across organizations’ web-connected devices and equipment. Learn More
Speakers:
Director of Solutions Engineering
Asimily

4:00 pm

Join us for an enlightening session that explores the transformative power of Hyperautomation, AI/ML, and Full Stack Analytics in shaping the future of business. Discover how Hyperautomation streamlines operations, while AI/ML revolutionizes decision-making and automation. Explore Full Stack Analytics for comprehensive insights across technology layers. Gain practical insights and best practices for adoption and implementation. Unleash the potential of these technologies to drive innovation, growth, and data-driven decision-making. Don’t miss this opportunity to transform your business in the digital age. Agenda: -Exploring the transformative power... Learn More
Speakers:
VP of Product Marketing
Gluware

In this session, dive into Alkira’s as-a-Service approach to bringing turnkey high-performance networking to sites, services, and cloud networks running in China. Whether connecting intracloud workloads within China or extending connectivity seamlessly to the rest of the global network, Alkira powers an identical experience with the performance and scale required to keep up with the pace of business. Learn More
Speakers:
Principal Cloud Architect
Alkira

Traditional network centric methods of achieving microsegmentation have failed us. These methods, largely centered around IP-address-centric policies, are ill-equipped to handle the sophisticated cyber threats that today’s enterprises face, including insider threats and advanced persistent threats. The rapid increase in remote working scenarios and the proliferation of Internet of Things devices have expanded the attack surface dramatically, introducing a myriad of new entry points for potential attackers. Traditional network segmentation strategies, therefore, struggle to maintain a granular level of control, offering a security posture that... Learn More
Speakers:
Technical Director
Elisity

This panel discussion features representatives from wireless service providers, equipment vendors, system integrators and large enterprises, and will describe a range of options for deploying private 5G networks. Enterprises can deploy a self-contained network with all of the 5G network infrastructure on-site, or enterprises can install only the 5G radios on-site and utilize 5G Core network functions operating in a service provider’s network or hosted in the cloud. For use cases requiring device mobility across a large geographic area, 5G network slicing will also enable... Learn More
Speakers:
Senior Research Analyst, 451 Research
S&P Global Market Intelligence
Sr. Product Marketing Manager, Private Networks
Cradlepoint

In the digital economy, applications are driving the need for secure cloud networking. Application architectures are evolving towards cloud-forward microservices and distributed service-oriented interdependencies. Building a cloud network that can connect public cloud networks, while ensuring application-aware service connectivity across public cloud, on-prem data centers, and remote edge sites is a challenge that many enterprises have yet to conquer. F5 will showcase its latest capabilities for securely connecting app services and cloud networks across multiple clouds to meet the requirements for the evolved cloud network... Learn More
Speakers:
Sr Manager Product Manager
F5

As networks evolve towards the cloud, the “pay-as-you-go” model significantly impacts network planning and cost structures, revealing an industry gap in effective cloud network design for optimized user experience. This session promises an insightful exploration of the challenges and opportunities in creating cloud, hybrid-cloud, multi-cloud, and cloud edge deployments, emphasizing the need for standard network reference architectures to help businesses optimize capital and operational expenditures. Agenda: -Understanding the “Pay-As-You-Go” Model: Impact on Network Engineering and Costs -The Industry Gap: Identifying Challenges in Cloud Network Designs... Learn More
Speakers:
VP/CTO, Global Enterprise Segment
World Wide Technology
VP, Global Head of Network Architecture, Engineering & Operations
S&P Global
Global Head of Telecommunication Services
HSBC

In this insightful session, we’ll explore the intricacies of the Kubernetes Bill of Materials (KBOM), highlighting its indispensable role for cybersecurity professionals in managing and securing enterprise Kubernetes deployments. Attendees will gain a comprehensive understanding of the KBOM, its functionalities, and its vital contribution to enhancing transparency, traceability, and security in today’s increasingly Kubernetes-centric infrastructure. Agenda: -Introduction to Kubernetes Bill of Materials (KBOM) -Understanding KBOM: Key Components and Functionalities -The Role of KBOM in Kubernetes Deployment Management -Real-World Application: Case Studies of KBOM in Action... Learn More
Speakers:
Senior Manager, Cyber Security Consulting Practice
EY

5:00 pm


8:00 am

We’re kicking off Day 2 of the ONUG Fall 2023 Conference with a speed dating approach to the day ahead. Nick Lippis, Johna Till Johnson, Maria Scarmardo and others will ensure you get the most value for your time spent at ONUG by breaking down session topics, interviewing sponsors and industry executives, and providing critical  insights into the rapidly changing landscape of  Networking, Enterprise Cloud, Security and DevOps. Don’t miss this pre-game and the exciting day ahead at ONUG Fall. Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
CEO and Founder
Nemertes Research
Founder
Praxis Data Security

9:00 am

Our engaging discussion will offer a deep dive into the world of Generative AI and Large Language Models (LLMs), shedding light on their current state of maturity, the progress of federal policies, and the best strategies for enterprises to adopt, support, and safeguard these advanced technologies. We will trace the journey of AI development, assess policy implications, and envisage the future of AI integration within enterprise operations. Agenda: -Introduction to Generative AI & LLMs: Current Landscape -Progress in Federal Policies: A Regulatory Perspective -Exploring Maturity... Learn More
Speakers:
CEO
Sand Hill East, LLC
CEO
Moogsoft

Join us for a keynote from Kanda Natarajan who will share invaluable lessons on the closely integrated collaboration required between networking and security teams within cloud and hybrid infrastructure environments. Gain real-world insights from GSK’s experiences in managing complex integrations and improving system performance and security. This presentation will provide strategies for successful digital transformation and operational excellence. Learn More
Speakers:
Vice President, Hosting Services GSK Digital & Tech
GSK

10:00 am

Organizations are only as secure as their weakest link. Prevention of cyber risks requires better defenses and architectures. Yet, many enterprises are struggling with implementation of solutions like Zero Trust Architectures. During this panel CISOs and cybersecurity veterans will share their experience in driving cross-organization transformations that require tight collaboration between different parts of the organization. It will discuss how joint design initiatives can enable secure modernization and security management simplification. Learn More
Speakers:
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
President
Cyber Aegis
CISO
Point72

11:00 am

Join ONUG’s Policy-as-Code (PaC) Working Group as they explore in this session the challenges and opportunities involved in developing and deploying Policy-as-Code solutions in the enterprise. Considered by Gartner to be a still-emerging technology trend, PaC promises game-changing improvements in the realms of security automation and compliance. Hear from Working Group members who have managed PaC initiatives specifically in the areas of network management, software delivery, and government regulatory adherence. Learn how these use cases are being leveraged to develop a framework for succeeding with... Learn More
Speakers:
CEO & Co-Founder
Concourse Labs
VP of Strategic Accounts
Network to Code

Join Steve Westmoreland in an insightful ONUG session on the “Software Bill of Material (SBOM): A Three-Step Plan for Maximum Effectiveness.” Dive deep into the intricacies of SBOM, learn actionable strategies for inventorying, monitoring, and integrating software components, and engage directly with a leading expert to enhance your organization’s software management and security practices. Agenda: -Introduction -Welcome and introduction by host: Brief on the importance of the Software Bill of Materials in today’s digital age. -Presentation by Steve Westmoreland a. Understanding the SBOM – What... Learn More
Speakers:
Senior Manager, Cyber Security Consulting Practice
EY

12:00 pm

As quantum computing advances, mitigating data harvesting between cloud environments connected by networks under adversarial control becomes increasingly urgent. Qrypt addresses this risk by providing easily deployable and simple quantum-secure solutions for data transmissions between cloud providers and geographically distributed enterprises. Our live POC session will discuss quantum risk in detail and showcase Qrypt’s ability to protect geographically separated, multi-cloud networks effectively and seamlessly. We will highlight our successful deployment with Megaport, a leading Network-as-a-Service (NaaS) solutions provider. This use-case demonstrates Qrypt and Megaport’s collaboration... Learn More
Speakers:
Co-Founder & CTO
Qrypt

he Automated Cloud Governance (ACG) Working Group is hosting the Multi-Cloud Cybersecurity Space Jam, a special evening event that will test the skills and knowledge of SOC practitioners while showcasing the benefits of adopting the working group’s Cloud Security Notification Framework (CSNF) product open source project. CSNF is designed to overcome the challenge of interpreting the babel of security alerts and notifications emanating from various cloud service providers and the proliferation of disparate cloud-based services. The lack of standard practices for security notification syntax and... Learn More
Speakers:
Sr. Director, Cloud Security Strategy & Engineering
Cigna
Field Chief Security Architect
Oracle
Cyber Security Principal, CISSP, CCSP, Security+
FedEx
Consultant
ThatCloudGroup

1:00 pm

Roughly a decade after cloud-based services transformed how large enterprises consume computing and storage, cloudification is hitting the network, driving service providers to reinvent Network-as-a-Service (NaaS) and race to deliver services imbued with cloud-like properties, such as: on-demand, consumption-based, scalable, flexible, application-aware, software-driven, open and transparent. In this second decade of the Cloud Era, how will NaaS adoption enable enterprises to overcome burdensome operational challenges and realize better outcomes for Global 2000 business stakeholders? Leaders in the Network Cloud Working Group will describe how service... Learn More
Speakers:
President
MarketWord, Inc.
Distinguished Engineer
Cisco
CTO
Microland Limited
Associate Fellow for NaaS
Verizon Business Global Solutions
Principal Architect
Cisco Systems, Inc.

Selector AI is an operational intelligence platform that automates anomaly detection and helps diagnose outages for hybrid-cloud connectivity and applications. Selector AI collects data from heterogeneous data sources, applies an ML-based data analytics approach, and provides actionable multi-dimensional insights by correlating metrics and events. Our customers can collaborate and share insights on various messaging platforms (Slack, Microsoft Teams) using search-driven querying with a conversational chatbot experience. Learn More
Speakers:
Principal Developer Evangelist
Selector AI

Is your ISP or cloud provider your first line of defense in the supply chain, or your weakest link? Enterprises increasingly store their assets, conduct operations, and serve customers via the Internet. This significantly extends their security perimeter beyond physical boundaries and makes them vulnerable to infrastructure attacks, including routing attacks. It aggravates the security challenges that they deal with already, such as ransomware, malware, APTs and denial of service attacks. It also creates a critical dependency on the reliability and security of the data... Learn More
Speakers:
Senior Director, Technology Programmes
Internet Society
Chief Network Architect
Visa
Distinguished Engineer
Comcast

The ONUG Collaborative Working Groups are the vehicle for driving market enablement for innovations in enterprise networking and security. Attend this closing plenary to meet the enterprise consumers and suppliers involved in the Collaborative and hear from leading members of the Collaborative on past accomplishments and future directions. Agenda: -ONUG Collaborative mission and structure. -Working Groups: 2023 outcomes and future directions. -Results of the on-site ONUG Fall Use Case voting. -Recognition of ONUG Collaborative key contributors. Who Should Attend: Everyone at the conference who is... Learn More
Speakers:
Service Provider CTO
ONUG
Co-Founder and Co-Chairman
ONUG

3:00 pm

Reserve your place with us today.
Register