ONUG Spring 2023 Agenda Archive



8:00 am

We’re kicking off the ONUG Spring 2023 Conference with a speed dating approach to the day ahead. Nick Lippis, Mark Tierney and others will ensure you get the most value for your time spent at ONUG by breaking down session topics, interviewing sponsors and industry executives, and providing critical insights into the rapidly changing landscape of Networking, Enterprise Cloud, Security and DevOps. Don’t miss this pre-game and the exciting day ahead at ONUG Spring. Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG

Join Nick Lippis Co-Founder of ONUG and Alex Shulman-Peleg of E&Y as they explore the changing role of network and security engineers in they take responsibility for cloud infrastructure. As businesses optimize and operationalize their cloud spend, network and security teams are taking on new responsibilities and facing new challenges. In this keynote session, we’ll discuss the skills and tools that network and security engineers need to be successful in this new environment. We’ll explore topics such as network automation, DevSecOps, cloud security, and examine... Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
EY Americas Cloud Cybersecurity Leader, Managing Director
EY

9:00 am

In this keynote session, ONUG community members will learn about the process and strategies Cigna, in partnership with AWS, used to design, implement, and operationalize our enterprise cloud deployment. The session will cover topics such as how we balanced the need for scalability and security with cost containment, the controls and processes we put in place to manage our cloud environment, and the technologies we used to drive efficiency and deliver business value. Agenda: -Introduction to the session -Overview of Cigna’s enterprise cloud deployment -How... Learn More
Speakers:
Managing Director, US Commercial Front Office Technologies
Cigna

Enterprise cloud adoption has become a must-have for organizations looking to improve their competitiveness and innovation. However, the complexity of cloud environments, the high costs associated with cloud services and the lack of visibility into cloud usage and costs, can often make it difficult for organizations to fully extract the value of their cloud investments. This keynote panel session will bring together experts from different industries to discuss new operational models that help organizations optimize their cloud value extraction and reduce costs. The panel will... Learn More
Speakers:
Associate Vice President of Cloud and Infrastructure Technology
Merck and Co., Inc.

10:00 am

As the public cloud continues to gain momentum, the gap broadens between operating traditional networks and cloud networks. A different set of skills and tooling is required to deploy and maintain network infrastructure. In this course, you will gain an understanding of the following: -The value proposition of Infrastructure-as-Code – Building basic AWS networking with HashiCorp’s Terraform –  Expanding the scope to multi-cloud with Network-as-a-Service – Benefits of a standardized toolchain for managing infrastructure Learn More
Speakers:
Principal Cloud Architect
Alkira

Enterprises are adopting hybrid multicloud architectures with applications and data assets spread across public, private and edge clouds. However, IT teams are challenged with deploying, managing, connecting and securing disparate architectures. These drastic shifts in the needs of applications and users are not addressable with traditional models of networking, including earlier generations of SDN, leading to increased pressure on CloudOps teams. In this session, you’ll learn how by reimagining connectivity from an application context, IT can solve the above challenges and enable self-service connectivity for... Learn More
Speakers:
Program Director, Software Networking Strategy
IBM

The Policy as Code working group will present the taxonomy and direction of this complicated initiative. The WG will illustrate why involving nearly every element of your organization in policy deployment and maintenance will greatly reduce the toil of your Enterprise. Learn More
Speakers:
CEO & Co-Founder
Concourse Labs
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
VP of Strategic Accounts
Network to Code
CTO, Enterprise Networking
Cisco
Head of Backbone Network Services
Citi
Sr. Director, Cloud Security Strategy & Engineering
Evernorth Health Services

As organizations accelerate adoption of cloud-native architectures using containers, Kubernetes, and IaC, traditional security approaches are no longer sufficient to address the volume of moving parts. Even a single vulnerability or misconfiguration can be replicated at scale, without clear visibility into potential exposure. Hyper-scalable approaches to security are required to address the modular, dynamic and distributed nature of changing architectures, especially with increased adoption of multi-cloud and added pressure on security teams to do more with less. This session will explore key strategies for hyper-scalable... Learn More
Speakers:
Director, Security Engineering
Tenable

11:00 am

When enterprises first experimented with the cloud, developers using what the cloud provider made available for security was fine – it was an experiment. When enterprises started lifting and shifting apps/workloads, it was acceptable to lift-and-shift security – using old approaches but applied to the cloud (i.e., virtual appliances). But looking at cloud, re-factored or born-in-the cloud apps and workloads, all of the existing approaches become cumbersome at best and broken at worst. They miss out on cloud agility, scalability, enterprise security capabilities, and multi-cloud... Learn More
Speakers:
Vice President, Cisco Multicloud Defense
Cisco Systems, Inc.

Prosimo provides a multi-cloud networking platform that simplifies distributed enterprise cloud journeys. It combines network transit, performance, security, observability and cost management powered by data insights and machine learning models. Prosimo will present a Proof of Concept (PoC) showing how quickly applications are onboarded and connected with compliance, cost and performance requirements considered. Security and performance are natively included to create application-centric access policies. Prosimo PoC will highlight the following: -Automated Day 0 and Day 1 configuration of the new cloud-based network to expand across... Learn More
Speakers:
Principal Solutions Architect
Prosimo

Find out how Gluware Network RPA powers hyperautomation, accelerates M&A gains, and ensures regulatory compliance. See for yourself how our pre-built inventory assessments, configuration audits, automated OS upgrades, and configuration management capabilities ensure consistent enforcement of policies across the network and streamline Day 0 and Day 2 processes, M&A IT network consolidations, and regulatory compliance. Real-world examples of how network automation has helped organizations achieve compliance with regulations and security standards such as PCI DSS, HIPAA, and CIS will be included. Learn More
Speakers:
Senior Director, Product Management
Gluware

Applications and data are being modularized into microservices and moved to multiple public clouds. In some cases, they are also being distributed to the network edge. They are increasingly being consumed from multiple software-as-a-service (SaaS) providers too. With applications and microservices popping up across all domains, the network should be seen as a growing set of interconnected “nerve clusters” situated where the data is, which could be anywhere along the edge-cloud continuum. The new network needs to be able to securely connect within and between... Learn More
Speakers:
VP, Strategy & Transformation
IBM
CEO and Co-Founder
Graphiant
Digital Technology Fellow and lead Network Architect
Raytheon Technologies
Co-Founder and Co-Chairman
ONUG

As organizations adopt DevOps practices, the need for “security as code” becomes paramount. This session will explore the concept of integrating security into the software development process, with a focus on how to automate the protection of networks through code. Attendees will learn about the benefits of implementing security as code, including increased speed and efficiency, as well as improved collaboration between security and development teams. We will discuss different tools and techniques for automating security, such as using infrastructure as code, vulnerability scanning and... Learn More
Speakers:
Founder & CEO
DryRun Security
Conference Co-Chair
DevSecOps@ONUG Fall
CTO
DefectDojo Inc.
Founder
Malicious Enterprises

“Organizations today face a daunting array of challenges in their quest to track and comply with corporate and regulatory policies. This proof of concept Nautobot App, takes aim at the never-ending attestation and reporting associated with this challenge: How do you take plain English written policies (“protect customer data”), make them actionable, and automate the compliance validation? The ability to transform written security and operational guidelines into tangible configuration intent via code would allow organizations the ability to ensure compliance with verifiable enforcement and end-to-end... Learn More
Speakers:
Director of Sales Engineering
Network to Code

Networks are complicated. They get even more complicated with the overlay/underlay functions of SDN, cloud connections, and ever-increasing capabilities. IP Fabric builds a model of your network, and generates diagrams and tables showing topology, configuration, and state information. Intent rules allow you to quickly identify potential misconfigurations and can be overlaid on topology diagrams to quickly visualize the impact on the network. Having a consistent source of information across multiple platforms and vendors enables and enhances your ability to understand, automate, control, and secure a... Learn More
Speakers:
Solution Architect
IP Fabric

The relationship between infrastructure professionals and developers can be challenging. Developers want the infrastructure to be fast, reliable and easy to use, while infrastructure professionals need to balance these requirements with security, scalability and cost-efficiency. This session will explore the common challenges that infrastructure pros face in trying to make developers happy, and will discuss strategies for improving collaboration and communication between the two groups. We will also cover best practices for infrastructure provisioning, management and monitoring that can help to meet the needs of... Learn More
Speakers:
Global Technology Executive
Director
Edward D Jones
Product Manager
IBM Software Networking Business Unit
IT Product, Engineering, and Transformation Leader
Formerly with Federal Reserve Bank of Richmond and Citi

12:00 pm

Speakers:
Co-Founder and Co-Chairman
ONUG
Enterprise Cloud Architect
Fidelity Investments
Evernorth Health Services
Evernorth, A Cigna Health Company


1:00 pm

Join a live Q&A with Ernest Lefner, Gluware’s Chief Product Officer, and Jeremy Schulman, Senior Director of Solution Engineering at Major League Baseball. The organization has internally fostered a build and buy approach to network automation with support from Gluware’s pre-built intelligent network automation capabilities that streamline key aspects of their network transformation goals. The pair will discuss the organization’s network objectives, how they are leveraging Gluware to accelerate network hyperautomation, and best practices for enterprises seeking to modernize their own networks. Learn More
Speakers:
Chief Product Officer
Gluware, Inc.
Senior Director of Solution Engineering
Major League Baseball

Join this session to hear firsthand how S&P Global built its enterprise-scale multi-cloud network exchange using Alkira, enabling their business to reach global markets faster. Learn how S&P Global’s data & technology teams leverage this Alkira-powered network exchange to securely and seamlessly connect multi-cloud and on-prem ecosystems. Digital Twins continues to play a critical role in building enterprise resilience and in this journey, Alkira enables enterprises like S&P Global to thrive in their multi-cloud strategy by providing a cloud-agnostic network as a service that reduces... Learn More
Speakers:
President, CEO and Founder
Alkira
VP, Global Head of Network Architecture, Engineering & Operations
S&P Global

2:00 pm

Network hyperautomation is a business and IT imperative and Gluware makes it easy. Attend this interactive session to See for yourself how hyperautomation revolutionizes NetOps processes from Day 0 to Day N, resulting in reduced operational costs, increased productivity, and improved customer experience. Experience Gluware’s game-changing multi-vendor hyperautomation solutions including no-code application suite, low-code IDE, and Network Robotic Process Automation (RPA) Learn how easy it is to automate complex and repetitive processes, optimize workflows, and enhance operational efficiency Hear how business are improving business outcomes... Learn More
Speakers:
VP of Product Marketing
Gluware
CSO and Co-Founder
Gluware

DevSecOps is adding Sec to DevOps processes. In this session we will hear from Platform, Cloud and DevOps leaders who are integrating security tools and controls into their architectures and pipelines. The panel will discuss practical methods to incentivize developers to show security attestations that will enable them to move faster. It will share lessons learned from successes and roadblocks. Taking examples like container security we will discuss how to introduce gates and controls that will incentivize developers to address security earlier in the development... Learn More
Speakers:
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Technology Director, Information Security
Wells Fargo
AVP Foundational Platforms, Office of the CTO
Merck
Director Information Security
Freddie Mac

Cloud networking can be difficult! It is fraught with 1) complexity and limitations of the cloud-native capabilities, 2) high cost and slow provisioning of the hardware-based architecture and 3) additional burden of running and operating agent-based solutions. Stop the do-it-yourself hamster wheel and step into the cloud era where network and network security move at the speed of cloud by being delivered as-a-service. Join this proof-of-concept demonstration to see practical examples of how you can design and deploy enterprise-class multi-cloud networking and network security in... Learn More
Speakers:
Senior Product Marketing Manager
Alkira

Riverbed Alluvio captures full-fidelity user experience, application, and network performance data on every transaction across the digital ecosystem. It then contextually correlates disparate data streams (including third party data) to quickly provide actionable insights and automate investigative workflows, empowering staff at all skill levels to solve problems fast. This presentation by Bill Coon will discuss the benefits of a unified observability platform that automates the best practices of IT experts, empowers staff at all levels to accelerate problem-solving, eliminates data silos, reduces alert fatigue, and... Learn More
Speakers:
Principal Solutions Architect
Riverbed Technology

Expectations for performance monitoring have grown. Today, businesses require rapid device and data integration without the need for custom efforts or manual configuration. And all those actionable insights modern monitoring platforms deliver? The torch has been passed to a new generation of requirements – where alert remediation and actions are automated. In this ONUG Spring POC, Dave Hegenbarth will discuss the evolution of modern monitoring, and how Pliant’s low-code platform can help businesses automate, integrate and connect their stack to deliver on the promise of... Learn More
Speakers:
VP Systems Engineering
Pliant

A discussion covering the role SONiC plays in analysis and characterization of workloads. The discussion topic will focus on various methods to extract data to be used to identify workload characteristics.. Learn More
Speakers:
Systems Engineer
Dell Technologies
Networking Sales Specialist
Dell Technologies

3:00 pm

The network edge is becoming an increasingly important aspect of wide area networking as organizations look to support the growing number of devices and services at the edge of the network. With the rapid changes in the WAN market, it’s essential for networks to be able to adapt and scale quickly to meet the demands of today’s dynamic business environment. This session will explore the concept of network elasticity, which is the ability of a network to expand and contract on-demand in response to changing... Learn More
Speakers:
Distinguished Engineer
Cisco
CTO
Microland Limited
Director of Architecture Global Alliances
ZPE Systems
Architecture Director - Global Enterprise Architecture
Evernorth Health Services
Principal Architect
Cisco Systems, Inc.
Product Leader - 5G and MEC
Verizon

Modern network operating systems (NOS) not only run on high performance physical platforms; they also can provide a containized variant of the same NOS capable of running on a few cores of an x86 processor. This enables new capabilities and use cases previously unavailable to network operators. Beginning with upskilling network engineers, a digital sandbox enables self-paced education with hands-on experience. The costs of a lab and effort in physical set-up/tear-down lab are essentially removed. Network Automation is focused on generation of code to configure... Learn More
Speakers:
Director, Data Center Switching Business Development
Nokia

As quantum computing advances, mitigating data harvesting between cloud environments connected by networks under adversarial control becomes increasingly urgent. Qrypt addresses this risk by providing easily deployable and simple quantum-secure solutions for data transmissions between cloud providers and geographically distributed enterprises. Our live POC session will discuss quantum risk in detail and showcase Qrypt’s ability to protect geographically separated, multi-cloud networks effectively and seamlessly. We will highlight our successful deployment with Megaport, a leading Network-as-a-Service (NaaS) solutions provider. This use-case demonstrates Qrypt and Megaport’s collaboration... Learn More
Speakers:
Co-Founder & CTO
Qrypt

Selector AI is an operational intelligence platform that automates anomaly detection and helps diagnose outages for hybrid-cloud connectivity and applications. Selector AI collects data from heterogeneous data sources, applies an ML-based data analytics approach, and provides actionable multi-dimensional insights by correlating metrics and events. Our customers can collaborate and share insights on various messaging platforms (Slack, Microsoft Teams) using search-driven querying with a conversational chatbot experience. Learn More
Speakers:
Senior Systems Engineer
Selector AI

Hyperautomation is an emerging technology that combines multiple automation tools and technologies to create a holistic solution that can automate business processes from end-to-end. Event-driven architectures are becoming increasingly popular as a way to handle the large volume of real-time data generated by modern applications and devices. This session will explore the intersection of hyperautomation and event-driven architectures, and discuss how organizations can leverage these technologies to create more responsive and efficient systems. We will cover best practices for deploying hyperautomation solutions in an event-driven... Learn More
Speakers:
Network & Cloud Architect
McKesson
VP of Product Marketing
Gluware
VP Systems Engineering
Pliant
NaaS, SASE and PaaS Consultant - Associate Fellow
Verizon Business Global Solutions
Director of Architecture Global Alliances
ZPE Systems
Associate Director
Merck

Infrastructure as Code (IaC) and Policy as Code (PaC) are two important trends in the field of IT operations. IaC is the practice of provisioning, configuring, and managing infrastructure using code, while PaC is the practice of managing policies using code. Both IaC and PaC have the potential to automate and simplify IT operations, but what is the connection between the two? This session will explore the relationship between IaC and PaC, and discuss how organizations can use these technologies together to improve efficiency, security... Learn More
Speakers:
CEO & Co-Founder
Concourse Labs
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Sr. Director, Cloud Security Strategy & Engineering
Evernorth Health Services

GitNops is an operational framework that takes DevOps best practices used for application development, such as version control, collaboration, compliance, and CI/CD and applies them to network operations and network automation. A Zero Trust implementation of GitNops is GitZT. Both are heavily influenced by the Fast Systems Thinking approach. It teaches network engineers an approach to automation that provides security, extensibility, scalability, reliability, and reparability.  The GitHub platform provides GitHub Actions, a CI/CD system that can run containerized applications such as Postman or Terraform in... Learn More
Speakers:
Enterprise Solutions Engineer
GitHub

Cloud journeys and digital transformation have changed the way applications are delivered – faster and more distributed. Web services continue to expand from the data center, to cloud, the edge, and across global CDNs at an accelerating rate. Applications are more dynamic and are delivered faster than ever however the dynamic applications also add threat surface by exposing interfaces or API’s. Applications are susceptible to anomalous traffic, bot attacks, API threats and others. Application Firewalls (WAFs) have traditionally provided application protection with strictly static approaches.... Learn More
Speakers:
Cloud Security Architect
Fortinet

In the digital economy, applications are driving the need for secure cloud networking. Application architectures are evolving towards cloud-forward microservices and distributed service-oriented interdependencies. Building a cloud network that can connect public cloud networks, while ensuring application-aware service connectivity across public cloud, on-prem data centers, and remote edge sites is a challenge that many enterprises have yet to conquer. F5 will showcase its latest capabilities for securely connecting app services and cloud networks across multiple clouds to meet the requirements for the evolved cloud network... Learn More
Speakers:
Principal Product Manager
F5

4:00 pm

Graphiant will be showing cloud on-ramp and provide customer with cloud access as-a-service. Graphiant is a Silicon Valley-based provider of next-generation Edge services. Led by Khalid Raza, the co-founder of SD-WAN pioneer Viptela, Graphiant has developed the Graphiant Network Edge. This “as-a-Service” solution provides connectivity between the enterprise WAN, hybrid cloud, network edge, customers, and partners. Graphiant’s Network Edge combines MPLS-like performance (speed, scale, and security) and the as-a-Service agility that enables network architects to build enterprise-grade networks at the speed of business. Graphiant PoC... Learn More
Speakers:
SE Director
Graphiant

The future of application delivery is infrastructure neutral. Application workloads are already scattered across multiple clouds, CDNs, edge locations, and data centers. Network operations teams face the challenge of delivering the high-performing applications that end users expect from this spaghetti of back-end resources. The panelists will discuss how network teams should be prepared for the new frontier of application connectivity and what challenges and opportunities come with it. Learn More
Speakers:
Founder and Principal
AvidThink
Chief Product Officer
NS1, an IBM company
VP Strategy | Product and GTM, Software Networking
IBM

Multi-cloud use has become common now a day. We can say that it’s a mandatory factor for business success in almost every industry. However, as we call it cloud sprawl, it’s also true that it’s becoming harder and harder to govern the cloud from the financial/security perspective. To address this issue, we believe in monitoring the cloud usage/cost and checking whether the governance works. In this PoC, we introduce the architecture and mechanism for that; Governing Multi-Clouds as codes from the financial/security perspective on the... Learn More
Speakers:
Business development of Cloud Native Technology
Net One Systems USA Inc.
Architect of Cloud Native Technology
NetOne Systems

Nile’s NaaS is an innovative network solution that features cutting-edge standardized hardware and software, built on a cloud-native LAN architecture. With NaaS, your organization will enjoy uninterrupted high-speed wired and wireless access, complete with built-in security. Unlike traditional LAN setups, NaaS is turn-key and eliminates complexity. This means that our customers are assured an unparalleled time-to-value. Join us for a live session to discover the finer details of our disruptive technology, and experience our user interface first-hand. Learn More
Speakers:
Solution Architect
Nile

Modern apps and services are increasingly being distributed across data centers, cloud and edge. As enterprises expand cloud footprints to support this new architecture, the WAN needs to transform from cloud-ready to cloud-centric. Cloud-based network services, such as software-defined cloud interconnect (SDCI), and security services, such as secure access service edge (SASE), are gaining adoption, and typically integrate with SD-WAN. As multiple cloud footprints, across multiple regions becomes the new reality, multi-cloud increases the networking complexity around premises-to-cloud, and cloud-to-cloud network connectivity. SDCI and colocation... Learn More
Speakers:
VP, Product and Solutions Engineering
Apcela

DevOps has proven to be a successful approach to software development and IT operations in many organizations. However, there is ongoing debate over whether DevOps can be scaled to meet the needs of large enterprises. In this Great Debate session, we will explore the pros and cons of DevOps in the large enterprise. Our panel of experts will present arguments for and against the scalability of DevOps in large enterprises, and will discuss real-world examples of DevOps implementations in large organizations. Attendees will have the... Learn More
Speakers:
Editor
Biz-Tech-Insights
VP and Managing Editor
Activate Marketing Services
Chief Product Officer
Gluware, Inc.
VP of Engineering
Nextira

5:00 pm

We would like to thank Chris Moretti of Cigna and celebrate his and Cigna’s ONUG Community contribution in moving digital transformation forward via hosting this ONUG Spring 2023 and for Cigna being a founding member of the ONUG Collaborative. We thank you for your strong thought leadership and support of the community. We also want to express our gratitude to Chris Moretti’s staff who have been wonderful to work with over the past several months. Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Evernorth Health Services
Evernorth, A Cigna Health Company

Join ONUG’s leadership for an interactive discussion about the future of ONUG and how it can best serve the community. In this session, you’ll have the opportunity to engage with ONUG’s leaders, ask questions, and provide feedback on how ONUG can continue to drive innovation and collaboration in the networking industry. We’ll explore topics such as emerging technologies, changing business models, and the evolving needs of Cloud, Network and Security professionals. Don’t miss this opportunity to help shape the future of ONUG and the enterprise... Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Chief Product Officer
Gluware, Inc.
Evernorth Health Services
Evernorth, A Cigna Health Company

8:00 am

We’re kicking off Day 2 of the ONUG Spring 2023 Conference with a speed dating approach to the day ahead. Nick Lippis, Mark Tierney and others will ensure you get the most value for your time spent at ONUG by breaking down session topics, interviewing sponsors and industry executives, and providing critical  insights into the rapidly changing landscape of  Networking, Enterprise Cloud, Security and DevOps. Don’t miss this pre-game and the exciting day ahead at ONUG Spring. Learn More
Speakers:
Co-Founder and Co-Chairman
ONUG

9:00 am

In this talk, Dr. Doug Comer, esteemed professor of Computer Science at Purdue University, will dive into the expanding world of AI and ML and its application to network automation. How/when has AI/ML succeeded in other fields? How has it failed? How much training data is needed? Where is this technology headed and what questions will need to be answered. Learn More
Speakers:
Distinguished Professor
Purdue University

Now is an opportunistic time to be a cloud networking expert. Today’s network engineers are increasingly being asked to leverage their on-prem expertise to support the cloud infrastructure to establish control and confidence. This organizational change enables cloud platform teams to rightfully focus on application development and continuous software delivery. Join Steve Mullaney, President & CEO at Aviatrix and Jason Simpson, VP Engineering at Choice Hotels as they discuss this new era for cloud networking leaders. Learn More
Speakers:
CEO
Aviatrix
Vice President of Engineering
Choice Hotels International

10:00 am

As Enterprises migrate to the cloud, their applications and data are now spread not just between private and public cloud, but increasingly between different public clouds, between SaaS providers and extended into edge clouds. This has created significant management and compliance challenges for network managers, who are no longer in control of the networks on which their applications rely. As a consequence, application performance is no longer deterministic, security of applications is at risk, and network skills and tasks relevant for one cloud are completely... Learn More
Speakers:
GM, Software Defined Networking
IBM

There is a strong enterprise play for private 5G networks and market momentum is building, enabled by a cast of ecosystem players lead by mobile network operators and RAN equipment vendors, as well as a host of companies developing cellular radio solutions designed for on-premise deployments. AWS, Cisco, IBM, VMware and other heavyweights are moving into private 5G, where managed service providers and system integrators will also play a key role in helping enterprises master the complexity of 5G network design and operations. Small cells... Learn More
Speakers:
ONUG CTO
ONUG
Technical Director, Global Network Architecture
FedEx
Sr. Product Marketing Manager, Private Networks
Cradlepoint
Managing Director for Solution Architects
Verizon
Industry Principal, Telco
Red Hat

A showcase of some of the types of no-code automation you can easily do with NetBrain. Learn More
Speakers:
Pre-Sales Engineer
NetBrain

As large organizations test the limits of what’s possible, they’re also testing the limits of what’s manageable — requiring new levels of visibility into their increasingly distributed and complex digital ecosystems. But what most companies call visibility falls short of the data breadth, depth, and intelligence it takes to be unstoppable. This use case will explore the challenges and solutions related to gaining the ultimate level of visibility into Service Assurance and Cybersecurity for complex enterprise application migration/transition projects for single or multiple cloud architectures... Learn More
Speakers:
Sr. Account Manager
NETSCOUT

11:00 am

The Aviatrix Certified Engineer (ACE)  Program offers the industry’s first multi-cloud networking education and certification that enables students to develop advanced networking security, and operational competencies in the public cloud. This foundational ACE training, offered free of charge ($895 USD value) to ONUG Spring attendees, covers the basic networking components and terminology of the major cloud service providers (AWS, Azure, GCP, and OCI) and discusses common challenges and key limitations when utilizing public cloud infrastructure. The training details proven design patterns for cloud architecture and key... Learn More
Speakers:
Vice President of Solutions Architecture
Aviatrix

In this session, we will explore the emergence of hyperscale service providers on the technology industry. Service providers are embracing a network that is programmable, on-demand with a cloud delivery model offering Network as a Service at hyperscale. We will discuss what hyperscale means, how it differs from traditional cloud services and the benefits it can provide for businesses. We will also cover the opportunity companies need to consider when working with hyperscale service providers. Additionally, the session will delve into the future of the... Learn More
Speakers:
Distinguished Engineer
Cisco
Sr. Director - Business Development & GTM Execution
AT&T Business
Director Solutions Architecture
Verizon Business Group
CTO
BT Business

The world of networking is rapidly changing, with the emergence of Network-as-a-Service (NaaS) solutions that allow for greater flexibility, scalability, and cost savings. This session will cover the latest NaaS advancements in technology and its practical applications in various use cases. Attendees will learn about cloud (SaaS/IaaS/PaaS, Hybrid & Multi-cloud) connectivity, SD-WAN replacement, LAN/WLAN, B2B network use cases and their associated benefits. We will cover the steps required to successfully deploy NaaS in your organizations. Session Outline: -Introduction to NaaS and its evolution in the... Learn More
Speakers:
Evernorth Health Services
Evernorth, A Cigna Health Company
President, CEO and Founder
Alkira
Vice President, Cisco Multicloud Defense
Cisco Systems, Inc.
Chief Product Officer and Co-founder
Nile

The Cloud Security Notification Framework (CSNF) is a set of guidelines and best practices for cloud security incident management and communication. It’s designed to help organizations improve their incident response capabilities and ensure the timely communication of security incidents to relevant stakeholders. This session will explore the implementation patterns for CSNF, which will include a demonstration by Splunk on how they have implemented the CSNF Canonical Data Model (CDM) to normalize messages for your SOC. Session Outline: -Introduction: The basics of Cloud Security Notification Framework... Learn More
Speakers:
Sr. Director, Cloud Security Strategy & Engineering
Evernorth Health Services
Staff Sales Engineer
Splunk
Field Chief Security Architect
Oracle

The objective of this session is to provide attendees with an understanding of SBOM, including the importance of SBOM for software security and supply chain visibility, the differences in perspectives of software vendors and large enterprise consumers, and the steps for creating an effective SBOM strategy. Agenda: -Introduction to SBOM (Software Bill of Materials) -The importance of SBOM for software security and supply chain visibility -Steps for creating an SBOM strategy -Best practices for maintaining an accurate and up-to-date SBOM -Q&A Target Audience: This session... Learn More
Speakers:
Senior Manager AppSec and Container Security
EY
Director Information Security
Freddie Mac
VP, Dependable Embedded Systems
Linux Foundation

12:00 pm

Location:
Place:
Speakers:

The Cloud Native Security Working Group’s goal is to help organizations adopt Cloud Native technologies securely. In this session, the group will discuss the critical importance of having a plan in place for dealing with Zero Day vulnerabilities that is premised on the adoption of fundamental Zero Trust Principles. Agenda: · A Review of Essential Zero Trust Principles and Strategies · The Zero Day Attack: What exactly constitutes a Zero Day attack – what are its defining characteristics? · Examples: What are some recent Zero... Learn More
Speakers:
Technology Industry & IT Consulting Executive
Renaissance Tech & Media
Information Security Advisor
FedEx
Senior Architect, Office of the CTO, Security Products
F5
SVP, Research and Consulting
Nemertes Research
President
MarketWord, Inc.
Co-Founder and CTO
LeakSignal
Executive Director, Head of Network Security
Standard Chartered Bank

The enterprise cloud era has brought about significant changes in the way organizations operate and the technologies they use. As a result, traditional organizational structures and roles are being re-evaluated, and new ways of working are emerging. This keynote panel session will bring together experts from different industries to discuss the organizational design trends and best practices in the enterprise cloud era. The panel will explore topics such as the impact of cloud computing on organizational structure, the role of cross-functional teams and the importance... Learn More
Speakers:
Director, Software Engineering
Fidelity Investments
Senior Vice President
Citibank N.A.
Global Head of Business Development and Strategic Partnerships
Morgan Stanley

This Private 5G demonstration showcases the benefits of leveraging Open RAN, open interfaces, and a Kubernetes-based cloud RAN platform for organizations looking to deploy their networks with agility, scalability, and flexibility. With Open RAN, customers are no longer locked to expensive and proprietary network equipment, while open interfaces give rise to software-defined principles that drive efficiency and programmability within the network. A Kubernetes-based platform enables operators to deploy and scale network functions easily, optimizing resource usage and reducing operational complexity. The demo will provide an... Learn More
Speakers:
Industry Principal, Telco
Red Hat

1:00 pm

Edge computing is a rapidly growing technology that has the potential to change the way we think about networks and data processing. By moving computing resources closer to the edge of the network, edge computing can help organizations reduce latency, improve performance and increase security. But is edge computing truly a tectonic shift in the way we think about computing, or is it just a niche market for hybrid work, consumer gaming, the metaverse, market data? This session will explore the current state of edge... Learn More
Speakers:
SVP, Research and Consulting
Nemertes Research
Technical Director, Global Network Architecture
FedEx
Head of Technology
Nokia

Quantum computing is an emerging brute-force tool that can provably break virtually all modern encryption protocols, but it has not yet reached the requisite scale. Although “harvest now, decrypt later” is the common threat most often discussed today, it has been a remarkably successful technique for more than a half century. The advent of cloud infrastructure and globally accessible networks enabled the bulk collection and exploitation of flaws in PKI. Although AES may be quantum-safe, it is primarily distributed using quantum-insecure algorithms like RSA and... Learn More
Speakers:
Co-Founder & CTO
Qrypt

Now that many companies have been on their cloud journeys for over a decade, this session will share 5 sobering realities I have experienced over my 11-year journey to the cloud as an Product and Engineering Manager. Session Outline: -Public Cloud is not cheaper. -At scale, the amount of infrastructure expense moving from CapEX to OpEX is minimal. -We can change our culture and ways of working slowly over time. -Patterns will accelerate our application migrations to the cloud. -Adopting the Public Cloud will allow... Learn More
Speakers:
IT Product, Engineering, and Transformation Leader
Formerly with Federal Reserve Bank of Richmond and Citi

As cloud networking teams are expected to manage a multitude of dynamic components, including cloud regions, data centers, and the edge, they face numerous complexities and inconsistencies, leading to inconsistent performance and greater business risk. Stay ahead in cloud networking and attend our brief Proof of Concept with Saad Mirza, Sr. Director, Solutions Architecture at Aviatrix, to discover how in-region, multi-region, multicloud, and external connectivity is simplified with Aviatrix’s Secure Cloud Network Backbone. Learn More
Speakers:
Senior Director of Solutions Architecture
Aviatrix

It is predicted that quantum computers will be capable of breaking popular encryption protocols at speeds that make it feasible to make use of the decrypted data. Specifically, modern public-key encryption protocols will not be sufficient for protecting the data from threat actors operating a quantum computer. Some threat actors may already be harvesting and storing large quantities of encrypted data that can be decrypted and useful in the future. This session will help the audience to better understand the emerging threats and the opportunities... Learn More
Speakers:
EY Americas Cloud Cybersecurity Leader, Managing Director
EY
Chief Cybersecurity Scientist
Citi

2:00 pm

As organizations increasingly adopt multi-cloud strategies, understanding the capabilities and limitations of multi-cloud networking is crucial. In this session, we will explore the current state of multi-cloud networking and separate fact from fiction. We will discuss the benefits and challenges of multi-cloud networking and review the various technologies and solutions available to address them. We will also examine real-world examples of multi-cloud networking in action and explore best practices for implementing and managing multi-cloud networks. This session will bring together a panel of experts to... Learn More
Speakers:
Network & Cloud Architect
McKesson
Digital Technology Fellow and lead Network Architect
Raytheon Technologies
VP Strategy | Product and GTM, Software Networking
IBM

3:00 pm

Speakers:
Co-Founder and Co-Chairman
ONUG