Agenda



8:00 am

Speakers:
Co-Founder and Co-Chairman
ONUG

9:00 am

In this keynote session, ONUG community members will learn about the process and strategies Cigna, in partnership with AWS, used to design, implement, and operationalize our enterprise cloud deployment. The session will cover topics such as how we balanced the need for scalability and security with cost containment, the controls and processes we put in place to manage our cloud environment, and the technologies we used to drive efficiency and deliver business value. Agenda: -Introduction to the session -Overview of Cigna’s enterprise cloud deployment -How... Learn More
Speakers:

Enterprise cloud adoption has become a must-have for organizations looking to improve their competitiveness and innovation. However, the complexity of cloud environments, the high costs associated with cloud services and the lack of visibility into cloud usage and costs, can often make it difficult for organizations to fully extract the value of their cloud investments. This keynote panel session will bring together experts from different industries to discuss new operational models that help organizations optimize their cloud value extraction and reduce costs. The panel will... Learn More
Speakers:

10:00 am


11:00 am

Applications and data are being modularized into microservices and moved to multiple public clouds. In some cases, they are also being distributed to the network edge. They are increasingly being consumed from multiple software-as-a-service (SaaS) providers too. With applications and microservices popping up across all domains, the network should be seen as a growing set of interconnected “nerve clusters” situated where the data is, which could be anywhere along the edge-cloud continuum. The new network needs to be able to securely connect within and between... Learn More
Speakers:

As organizations adopt DevOps practices, the need for “security as code” becomes paramount. This session will explore the concept of integrating security into the software development process, with a focus on how to automate the protection of networks through code. Attendees will learn about the benefits of implementing security as code, including increased speed and efficiency, as well as improved collaboration between security and development teams. We will discuss different tools and techniques for automating security, such as using infrastructure as code, vulnerability scanning and... Learn More
Speakers:

The relationship between infrastructure professionals and developers can be challenging. Developers want the infrastructure to be fast, reliable and easy to use, while infrastructure professionals need to balance these requirements with security, scalability and cost-efficiency. This session will explore the common challenges that infrastructure pros face in trying to make developers happy, and will discuss strategies for improving collaboration and communication between the two groups. We will also cover best practices for infrastructure provisioning, management and monitoring that can help to meet the needs of... Learn More
Speakers:

12:00 pm


1:00 pm


2:00 pm

The Policy as Code working group will present the taxonomy and direction of this complicated initiative. The WG will illustrate why involving nearly every element of your organization in policy deployment and maintenance will greatly reduce the toil of your Enterprise. Learn More
Speakers:

In today’s fast-paced and ever-changing threat landscape, organizations need to have a clear understanding of what’s happening on their networks. This session will explore the concept of observability and its importance in security infrastructure. Attendees will learn about the benefits of implementing observability, including increased visibility into network activity and improved incident response. We will discuss different tools and techniques for implementing observability, such as log aggregation, metrics collection and distributed tracing. The session will also cover best practices for integrating observability into the security... Learn More
Speakers:

3:00 pm

The network edge is becoming an increasingly important aspect of wide area networking as organizations look to support the growing number of devices and services at the edge of the network. With the rapid changes in the WAN market, it’s essential for networks to be able to adapt and scale quickly to meet the demands of today’s dynamic business environment. This session will explore the concept of network elasticity, which is the ability of a network to expand and contract on-demand in response to changing... Learn More
Speakers:

Hyperautomation is an emerging technology that combines multiple automation tools and technologies to create a holistic solution that can automate business processes from end-to-end. Event-driven architectures are becoming increasingly popular as a way to handle the large volume of real-time data generated by modern applications and devices. This session will explore the intersection of hyperautomation and event-driven architectures, and discuss how organizations can leverage these technologies to create more responsive and efficient systems. We will cover best practices for deploying hyperautomation solutions in an event-driven... Learn More
Speakers:

Infrastructure as Code (IaC) and Policy as Code (PaC) are two important trends in the field of IT operations. IaC is the practice of provisioning, configuring, and managing infrastructure using code, while PaC is the practice of managing policies using code. Both IaC and PaC have the potential to automate and simplify IT operations, but what is the connection between the two? This session will explore the relationship between IaC and PaC, and discuss how organizations can use these technologies together to improve efficiency, security... Learn More
Speakers:

4:00 pm

DevOps has proven to be a successful approach to software development and IT operations in many organizations. However, there is ongoing debate over whether DevOps can be scaled to meet the needs of large enterprises. In this Great Debate session, we will explore the pros and cons of DevOps in the large enterprise. Our panel of experts will present arguments for and against the scalability of DevOps in large enterprises, and will discuss real-world examples of DevOps implementations in large organizations. Attendees will have the... Learn More
Speakers:

5:00 pm


8:00 am


9:00 am


10:00 am


11:00 am

Kubernetes has become the de facto standard for container orchestration, and many organizations have adopted it as a key component of their cloud-native infrastructure. However, as Kubernetes becomes more popular, it’s essential to question whether it’s the right choice for every organization. Non-native cloud services, like Kubernetes, still require much learning and time to configure securely. Most companies struggle with this quickly as their setup resembles the old monoliths of the past that are slowly created and tend to never go away…a very non-cloud model.... Learn More
Speakers:

There’s a strong enterprise play for private 5G networks and there is lot of momentum in this area, but with a cast of players that is more interesting and diverse than just the leading carriers. Open RAN is also a key enabling technology to drive down the cost of the radio gear by utilizing off-the-shelf server platforms, cloud-native software stacks, etc. 5G also has APIs for exposing the state of the network to applications, which is a key enterprise requirement. AWS, Cisco and others have... Learn More
Speakers:

The world of networking is rapidly changing, with the emergence of Network-as-a-Service (NaaS) solutions that allow for greater flexibility, scalability and cost savings. This session will celebrate the arrival of the NaaS era and discuss the steps that organizations can take to plan for and successfully adopt NaaS solutions in their corporate networks. Attendees will leave this session with a clear understanding of the NaaS landscape and the steps they can take to plan for and successfully adopt NaaS solutions in their own organizations. Session... Learn More
Speakers:

The Cloud Security Notification Framework (CSNF) is a set of guidelines and best practices for cloud security incident management and communication. It’s designed to help organizations improve their incident response capabilities and ensure the timely communication of security incidents to relevant stakeholders. This session will explore the implementation patterns for CSNF, including best practices for incident management, incident notification and incident response. We will also discuss the challenges organizations may face when implementing CSNF and strategies for overcoming them. Attendees will also have the opportunity... Learn More
Speakers:

12:00 pm

Location:
Place:
Speakers:

1:00 pm

The Cloud Native Security Working Group’s goal is to help organizations adopt cloud-native technologies securely. In this session, the group will discuss the importance of having a plan in place for dealing with zero-day vulnerabilities, exploits and attacks that include execution for detection, risk assessment, mitigation and reporting. Attendees will learn about best practices for identifying and mitigating these types of threats, strategies for responding effectively in the event of an attack as well as see live demonstrations on mitigations solutions. Session Outline: -Introduction: The... Learn More
Speakers:

Edge computing is a rapidly growing technology that has the potential to change the way we think about networks and data processing. By moving computing resources closer to the edge of the network, edge computing can help organizations reduce latency, improve performance and increase security. But is edge computing truly a tectonic shift in the way we think about computing, or is it just a niche market for hybrid work, consumer gaming, the metaverse, market data? This session will explore the current state of edge... Learn More
Speakers:

Zero trust access is a popular topic in the cybersecurity world, but for some it’s become the “Nickelback” of discussions – overplayed and misunderstood. This session aims to demystify the concept and provide practical solutions for implementing a zero trust security model. Attendees will learn about the benefits of zero trust, including increased security and improved visibility into network activity. We will discuss the challenges of implementing zero trust, including complexity, limited visibility and lack of understanding. The session will also cover best practices for... Learn More
Speakers:

2:00 pm

As organizations increasingly adopt multi-cloud strategies, understanding the capabilities and limitations of multi-cloud networking is crucial. In this session, we will explore the current state of multi-cloud networking and separate fact from fiction. We will discuss the benefits and challenges of multi-cloud networking and review the various technologies and solutions available to address them. We will also examine real-world examples of multi-cloud networking in action and explore best practices for implementing and managing multi-cloud networks. This session will bring together a panel of experts to... Learn More
Speakers:

The enterprise cloud era has brought about significant changes in the way organizations operate and the technologies they use. As a result, traditional organizational structures and roles are being re-evaluated, and new ways of working are emerging. This keynote panel session will bring together experts from different industries to discuss the organizational design trends and best practices in the enterprise cloud era. The panel will explore topics such as the impact of cloud computing on organizational structure, the role of cross-functional teams and the importance... Learn More
Speakers:

3:00 pm

Reserve your place with us today.
Register