Building the Next - Gen Network for Enterprise AI Adoption


Frisco | Dallas - May 13–14, 2026

Nick Lippis
Co-Founder and Co-Chairman
Tom Gillis
SVP & GM, Infrastructure & Security Group
Peter Campbell
Senior Director of Cloud Security
Andy Brown
CEO
Co-Chair
Tony Farinacci
Managing Director, CTO, CISO, Distinguished Architect
CTO
Jeremy Rossbach
Chief Technical Evangelist - NetOps
Aidan Walden
Global Director of Public Cloud Architecture and Engineering
Charlene O’Hanlon
Editor
VP and Managing Editor

Build the Foundation. Enable the Fabric. Power the AI Future

Don’t miss the next AI Networking Summit, where enterprise IT leaders learn how to evolve their networks into AI-Native Infrastructure. Join us to go beyond theory and discover real-world frameworks from the experts leading the AI-native transition.

In 2026, the AI Networking Summit series will help enterprises move from AI experimentation to true AI readiness; equipping IT leaders, architects and practioners with the frameworks, architectures and operational models needed to build and scale AI  inside the enterprise.

Taking place May 13-14 at The Hyatt Regency Frisco | Dallas, the Summit is conveniently located close to the DFW metroplex, the Stonebriar Centre Mall and The Ford Center.

Join the biggest names in Industry and Enterprise IT as we move towards successful AI implementation and adoption.
Register Today 

Key AI Networking Summit Topics - Building the AI-Native Enterprise Network Fabric

AI Infrastructure

Build the foundation for enterprise AI. This track covers private infrastructure, cost models, and scaling AI workloads in production.

AI has evolved from passive insights to active decision-making—drafting emails, generating code, and executing tasks across enterprise systems. As AI agents grow more powerful, they also introduce unpredictability, expanding attack surfaces and compliance risks. In this session, Netskope shows how to move beyond simply enabling AI to securing it at every touchpoint. We’ll outline a practical blueprint to protect AI agents end-to-end across users, applications, and data.

Learn how to maintain visibility into agent behavior, apply advanced DLP and threat protection to reduce misuse, and build an AI security strategy that balances innovation with governance.

Across the Global 2000, most AI initiatives remain stuck in experimentation and proof-of-concept phases. The reasons are clear: GPU and accelerator costs remain high, hardware obsolescence cycles are accelerating, skilled infrastructure talent is scarce, equipment lead times are unpredictable, and many enterprises lack the power, cooling, and space required to scale AI infrastructure.
This session examines how the vendor ecosystem is responding with new silicon, system architectures, networking fabrics, managed AI infrastructure, and consumption models designed to reduce risk and accelerate enterprise adoption. The discussion will focus on how enterprises can move beyond experimentation to deploy production AI infrastructure that enables true business transformation and competitive advantage.

Key Questions

  • What are the biggest infrastructure barriers preventing enterprises from moving AI projects from PoC to production?
  • How are vendors addressing cost, obsolescence risk, and supply chain constraints in AI infrastructure?
  • What new architectures (accelerators, networking fabrics, composable infrastructure) are emerging to make AI more enterprise-ready?
  • Can new consumption models—AI infrastructure-as-a-service, managed GPU clusters, or hybrid deployment models—reduce capital risk?
  • How should enterprises plan infrastructure investments when the pace of AI hardware innovation is so rapid?

Takeaways

  • A clear view of the real infrastructure headwinds slowing enterprise AI adoption today.
  • Insight into new vendor innovations in silicon, networking, and system design aimed at reducing cost and deployment friction.
  • Practical guidance on how enterprises can build AI infrastructure strategies that minimize risk while enabling large-scale transformation

AI Networking

Redesign the network for the AI era with agentic overlays, A2A fabrics, and architectures built for autonomous systems.

As AI models continue to scale, both training and inference are growing rapidly in operational importance. Training pushes the limits of compute density and interconnect scale, while inference now dominates production workloads. Together, these forces are reshaping AI system architectures.

Meeting these demands requires a next-generation networking fabric that can:

  • Scale up within and across a small number of racks to tightly couple XPUs for high-throughput training and low-latency inference
  • Scale out across entire data centers using flat, high-performance topologies that support large-scale training and high-fanout inference workloads
  • Scale across geographically distributed data centers, enabling unified AI fabrics that support million-plus-XPU training and inference environments.

We will present the latest advancements in industry initiatives—including Ethernet Scale-Up Networking (ESUN), Scale-Up Ethernet Transport (SUE-T), and Open Cluster Design for AI—and show how Ethernet is democratizing large-scale AI deployments through insights from G42 and other AI operators.

Enterprise network and security operations centers are sitting on a goldmine of untapped efficiency — not from bleeding-edge autonomous agentic AI, but from mature, battle-tested capabilities already at their fingertips. This panel brings together practitioners who have deployed large language models, machine learning pipelines, and intelligent automation within live NOC and SOC environments to cut mean-time-to-resolution, reduce alert fatigue, and reclaim analyst capacity. Panelists will share concrete before-and-after metrics, walk through implementation playbooks that worked — and the integration pitfalls, data-quality traps, and organizational resistance that nearly derailed them. If your team is still triaging thousands of alerts manually or troubleshooting network issues with legacy runbooks, this session delivers the pragmatic roadmap to operationalize AI capabilities that are proven, available today, and delivering measurable ROI.

Agentic AI overlays promise networks that sense, reason, and act—but the real challenge is treating AI agents as first-class identities in the network. Building on ONUG’s A2A and Agentic Overlay concepts, this session explores how to standardize identity, trust, and messaging among agents, and how those agents interact with the underlying network fabric.
Key Questions: – What should an A2A reference architecture look like in a large enterprise (broker vs. mesh, policy dialects, schemas)? – How do we provide Zero-Trust identity and least-privilege capability routing for agents issuing network changes? – What telemetry is needed to link agent intents → network changes → workload outcomes → cost? – How do you avoid “agent sprawl” and conflicting policies across multiple vendors’ AI assistants?
Takeaways: – A clear mental model of Agentic Overlays and A2A in networking. – Governance patterns for letting agents safely orchestrate NaaS, routing, and provisioning.

As traffic demands increased, eBay needed to scale network bandwidth without sacrificing cost efficiency or operational predictability. In this session, eBay will discuss how it used open networking and SONiC to move from 100G to 400G, enabling faster upgrades, greater hardware flexibility, and stronger long-term operational control. Attendees will gain practical insight into how standardized, vendor-agnostic networking can help modernize infrastructure while supporting scale, efficiency, and consistent NetOps operations.

AI Security

Secure the rise of AI agents with zero-trust frameworks, guardrails, and full visibility into machine-driven actions.

As enterprises adopt agentic AI, they face a new class of adversary: autonomous, goal-seeking agents that probe controls, data, and policies at machine speed. Building on ideas like “Digital Darwinism” and adversarial agents competing to optimize infrastructure, this session asks: what happens when attackers weaponize agents—and how do
we respond?
Key Questions: – How will adversarial agents change red-teaming, penetration testing, and threat modeling? – What defensive patterns are emerging for agent endpoint protection, data controls, and PII sensitivity mitigation? – Where do AI guardrails, content moderation, and design best practices fit in the security architecture versus at the application layer? – How do we monitor for agent-vs-agent “arms races” inside the enterprise and prevent unintended escalation?
Takeaways: – A taxonomy of adversarial agent threats relevant to Global 2000 environments. – Concrete examples of guardrail policies and monitoring approaches that actually reduce risk.

This session explores the growing risk posed by quantum-enabled decryption, referred to as Q-Day, the point at which sufficiently powerful quantum computers could undermine widely used public-key cryptosystems. Attendees will examine what this shift means for today’s networks, including the “harvest now, decrypt later” risks and the operational impact of large-scale cryptographic compromise. The discussion will also look at quantum technologies as part of a forward-looking security strategy. Panelists will discuss where these approaches are most relevant, how they can complement broader migration efforts, and what organizations should be doing now to build resilient, tamper-evident communications that can withstand future quantum adversaries.

Who Should Attend:
Cybersecurity professionals, network engineers, IT security architects, and executives responsible for data protection in AI-driven environments. This session is especially valuable for those in finance, healthcare, government, and critical infrastructure sectors where encryption compromise would have severe consequences.

What You Will Learn:

  • The mechanics and realistic timelines of quantum decryption threats, including the impact of algorithms like Shor’s on current cryptographic standards.
  • Core principles of quantum networking, such as QKD and entanglement distribution, and how they differ from and complement classical security methods.
  • Strategies for assessing organizational exposure to quantum threats and planning migration to quantum-resistant and quantum-secured architectures.
  • Practical first steps for evaluating, piloting, and implementing quantum networking solutions to protect sensitive data flows against future decryption risks.

Enterprises are deploying agentic AI, but risk controls remain incomplete. Observability tools map which agents exist and how they interact, while gateways filter prompts and responses—yet neither addresses the core problem: what the agent actually executes inside enterprise systems.

In this session, Rein Security responds to the ONUG Agentic AI Challenge by demonstrating how an Agentic AI Control Plane can govern autonomous systems in production.

Using the ONUG AOMC demo architecture, Rein will show how enterprises can monitor and enforce the three W’s of agent behavior—who accessed a system, what they accessed, and why the action occurred.

Agentic AI systems are useless without provable identity, least-privilege authorization, and strong supervision for non-human actors. This session builds directly on board use cases calling for Zero-Trust identity frameworks for agentic AI in Tier-1/Tier-2 operations, extending those concepts into a full enterprise security model.
Key Questions: – How do you assign and manage identity, credentials, and posture for agents that can provision, patch, and reconfigure networks, applications, and data pipelines? – What does capability-scoped, time-boxed authorization look like in practice for AI tools and agents? – How do we create signed, auditable action trails that satisfy internal audit and regulators for “who/what acted, when, and with what policy”? – How do you integrate agent identity into existing Zero-Trust and privileged access strategies?
Takeaways: – A practical pattern for a Zero-Trust identity framework for agentic AI across network, cloud, and ITSM stacks. – Controls and dashboards that make agent actions observable, provable, and reversible.

AI Automation

Transform operations from NOC to AOC with trusted automation, human-in-the-loop design, and agent-driven workflows at scale.

Enterprises are investing heavily in AI, yet many initiatives stall when moving from pilot to production—not because of models or data, but the network. The connectivity layer remains fragmented, manual, and static, lacking a unified system of truth across locations, providers, and services. This session introduces a programmable connectivity layer for AI-ready infrastructure, combining location intelligence, automated discovery, quote-to-order automation, and continuous reconciliation. By transforming connectivity into a dynamic, software-driven foundation, enterprises can accelerate deployment, improve cost and performance decisions, and enable AI systems to autonomously manage and optimize infrastructure across multi-cloud and edge environments.

Building on the NYC “From NOC to AOC” concept, this session focuses on operational trust: how to evolve from human-centric operations centers to Agentic Operations Centers (AOCs) where AI agents handle most monitoring and remediation—but humans still own accountability. It ties directly into ONUG’s 2026 focus on agentic operations you can trust, including standard identity, guardrails, and observability.
Key Questions: – What work should be fully handed to agents in 2026 (Tier-1, Tier-2 incidents, routine changes), and what must remain human-centric? – How do you train and certify “agent supervisors” to oversee closed-loop systems without being buried in noise? – How do you design human-in-the-loop patterns that are fast enough for AI-era incidents yet still satisfy governance? – What changes in org design, skills, and incentives are needed for teams to trust automation?
Takeaways: – A target operating model for AOCs, including roles, skills, and escalation patterns. – Examples of closed-loop NetOps/SecOps where agents deliver measurable MTTR and SLO gains.

The phrase “network autonomy” is everywhere. But what does it actually look like in practice? In this session, we will demonstrate an interlocking AI architecture working across a real-world network to identify, triage and resolve traditionally hidden issues in minutes, not hours. Watch foundation models detect the anomaly, the reasoning engine correlate it across topology and config state via MCP, and agentic processes propose and execute governed remediation through Ansible. As important, we will introduce a working model for human + AI partnership where every AI decision is transparent, confidence-building and overridable.

Special Programs

The Special Programs Track highlights the breakthrough technologies and initiatives shaping the future of enterprise IT including SONiC and Quantum Computing

This session explores the growing risk posed by quantum-enabled decryption, referred to as Q-Day, the point at which sufficiently powerful quantum computers could undermine widely used public-key cryptosystems. Attendees will examine what this shift means for today’s networks, including the “harvest now, decrypt later” risks and the operational impact of large-scale cryptographic compromise. The discussion will also look at quantum technologies as part of a forward-looking security strategy. Panelists will discuss where these approaches are most relevant, how they can complement broader migration efforts, and what organizations should be doing now to build resilient, tamper-evident communications that can withstand future quantum adversaries.

Who Should Attend:
Cybersecurity professionals, network engineers, IT security architects, and executives responsible for data protection in AI-driven environments. This session is especially valuable for those in finance, healthcare, government, and critical infrastructure sectors where encryption compromise would have severe consequences.

What You Will Learn:

  • The mechanics and realistic timelines of quantum decryption threats, including the impact of algorithms like Shor’s on current cryptographic standards.
  • Core principles of quantum networking, such as QKD and entanglement distribution, and how they differ from and complement classical security methods.
  • Strategies for assessing organizational exposure to quantum threats and planning migration to quantum-resistant and quantum-secured architectures.
  • Practical first steps for evaluating, piloting, and implementing quantum networking solutions to protect sensitive data flows against future decryption risks.

This session examines quantum-safe networking as an emerging approach to strengthening security for high-bandwidth connections across large-scale enterprise data center environments. We will define key concepts in quantum-safe networking – including the role of quantum phenomena such as entanglement in supporting secure, tamper-evident communications over fiber infrastructure and hybrid solutions.
With cyber risk increasing and AI workloads driving demand for large-scale data movement, the discussion will explore where conventional cryptographic approaches face operational and lifecycle challenges on high-speed links, and how quantum-safe architectures may complement existing security models. The session will also address practical adoption considerations, including readiness assessments, implementation planning, and hybrid quantum-classical deployment strategies beyond PQC transitions already underway.
Attendees will leave with a clearer understanding of the technology landscape, relevant use cases, and a pragmatic framework for evaluating quantum networking within enterprise infrastructure roadmaps.

AI Factories are expensive ecosystems. Design, Deployment, and workload scheduling need to be automated to ensure the desired outcome. This session shows how Aviz ONES delivers the blueprint for SONIC networks and end-end orchestration experience through partner integrations.

AI Networking Summit Co-Chairs

Nick Lippis
Co-Founder and Co-Chairman
Phil Tee
EVP & Head AI Innovations
Co-Chair
Andy Brown
CEO
Co-Chair
Tony Farinacci
Managing Director, CTO, CISO, Distinguished Architect
CTO
Brian Gilbert
Chief Technical Advisor and Vice President

AI Networking Summit Speakers

Tom Gillis
SVP & GM, Infrastructure & Security Group
Peter Campbell
Senior Director of Cloud Security
Jon Pruskowski
Director of Software Engineering, Cloud Networking
Mark Rushing
Managing Director - Head of Security Operations and Threat Management Technology
Jeremy Rossbach
Chief Technical Evangelist - NetOps
Eric Hanselman
Chief Analyst
AI Networking Summit 2026: Conference Pass

JOIN US in Frisco | Dallas !

Single, In-Person Conference Pass, Team Conference Pass and Vendor Pass includes access to all sessions and events May 13-14  including:

  • Thought Leadership Keynotes, Main Stage and Panel sessions
  • Invitation-only sessions led by ONUG Executive Board Members
  • Over 40 Tools, Technologies and Techniques Presentations from leading vendors
  • Solutions Showcase – Meet with more than 40 IT Suppliers including SONiC providers
  • All meals, refreshments and networking reception on Day 1 and Closing Party on Day 2
  • Networking opportunities and Events
  • Access to Mobile App to network with attendees, sponsors and speakers
  • Access to all post-event archived sessions
  • Welcome Gift upon arrival (while supplies last)

*Early bird pricing through April 30, 2026

FULL CONFERENCE PASS Enterprise IT Only
$1699
$1999 reg
REGISTER
VENDOR CONFERENCE PASS
$2699
$2999 reg
REGISTER
TEAM PASS Enterprise IT Only (Up to 3 Team Members)
$3399
$3999 reg
REGISTER

Catch the Highlights from 2025's AI Networking Summit in New York

The 2025 AI Networking Summit in New York was a breakout event. With over 1,000 attendees, 45+ sponsors and a speaker line up filled with the Industry’s brightest minds, this was the place to learn about the monumental impact AI will have on the future of the digital enterprise. Don’t miss the 2026 event in Dallas, May 13–14, 2026.

Industry Leader
Thought Leader
Partners
Interested in becoming a sponsor?