ONUG Conference Day 1 Wrap Up and Networking Event

NaaS Working Group Update: “What is NaaS? What is Its Value and Potential? What You Need to Know Now”

Roughly a decade after cloud-based services transformed how large enterprises consume computing and storage, cloudification is hitting the network, driving service providers to reinvent Network-as-a-Service (NaaS) and race to deliver services imbued with cloud-like properties, such as: on-demand, consumption-based, scalable, flexible, application-aware, software-driven, open and transparent. In this second decade of the Cloud Era, how will NaaS adoption enable enterprises to overcome burdensome operational challenges and realize better outcomes for Global 2000 business stakeholders? Leaders in the Network Cloud Working Group will describe how service…

Cloud Native Security Working Group Update: A Practitioner’s Guide to Zero Trust Security

The Cloud Native Security Working Group has developed a practical handbook for “Building a Zero Trust Security Practice”, which takes practitioners from essential principles such as “Never Trust, Always Verify”, “Assume Breach”, and “Least Privilege” to a set of concrete operational practices that bring these notions to life. Validated by first-hand experience at a global Fortune 100 company, these practices are attainable – and necessary – to safeguard critical enterprise assets in a world where cyber criminals loom as an ever-present threat. Attend this session…

Policy as Code Working Group Update: Exploring Policy-as-Code Use Cases

Join ONUG’s Policy-as-Code (PaC) Working Group as they explore in this session the challenges and opportunities involved in developing and deploying Policy-as-Code solutions in the enterprise. Considered by Gartner to be a still-emerging technology trend, PaC promises game-changing improvements in the realms of security automation and compliance. Hear from Working Group members who have managed PaC initiatives specifically in the areas of network management, software delivery, and government regulatory adherence. Learn how these use cases are being leveraged to develop a framework for succeeding with…

Keynote: How to Drive Modernization and Redesign for Agility and Risk Reduction

Organizations are only as secure as their weakest link. Prevention of cyber risks requires better defenses and architectures. Yet, many enterprises are struggling with implementation of solutions like Zero Trust Architectures. During this panel CISOs and cybersecurity veterans will share their experience in driving cross-organization transformations that require tight collaboration between different parts of the organization. It will discuss how joint design initiatives can enable secure modernization and security management simplification.

Keynote: Exploring Generative AI & Large Language Models: Maturity, Policy, and Enterprise Implementation

Our engaging discussion will offer a deep dive into the world of Generative AI and Large Language Models (LLMs), shedding light on their current state of maturity, the progress of federal policies, and the best strategies for enterprises to adopt, support, and safeguard these advanced technologies. We will trace the journey of AI development, assess policy implications, and envisage the future of AI integration within enterprise operations. Agenda: -Introduction to Generative AI & LLMs: Current Landscape -Progress in Federal Policies: A Regulatory Perspective -Exploring Maturity…

Demystifying Kubernetes Bill of Materials (KBOM): A Crucial Asset for Enterprise Cybersecurity

In this insightful session, we’ll explore the intricacies of the Kubernetes Bill of Materials (KBOM), highlighting its indispensable role for cybersecurity professionals in managing and securing enterprise Kubernetes deployments. Attendees will gain a comprehensive understanding of the KBOM, its functionalities, and its vital contribution to enhancing transparency, traceability, and security in today’s increasingly Kubernetes-centric infrastructure. Agenda: -Introduction to Kubernetes Bill of Materials (KBOM) -Understanding KBOM: Key Components and Functionalities -The Role of KBOM in Kubernetes Deployment Management -Real-World Application: Case Studies of KBOM in Action…

Cloud Network Design Patterns: Bridging the Industry Gap and Optimizing Business Outcomes

As networks evolve towards the cloud, the “pay-as-you-go” model significantly impacts network planning and cost structures, revealing an industry gap in effective cloud network design for optimized user experience. This session promises an insightful exploration of the challenges and opportunities in creating cloud, hybrid-cloud, multi-cloud, and cloud edge deployments, emphasizing the need for standard network reference architectures to help businesses optimize capital and operational expenditures. Agenda: -Understanding the “Pay-As-You-Go” Model: Impact on Network Engineering and Costs -The Industry Gap: Identifying Challenges in Cloud Network Designs…

ACG Working Group Update: Report on the Outcome of the Multi-Cloud Cybersecurity Space Jam

he Automated Cloud Governance (ACG) Working Group is hosting the Multi-Cloud Cybersecurity Space Jam, a special evening event that will test the skills and knowledge of SOC practitioners while showcasing the benefits of adopting the working group’s Cloud Security Notification Framework (CSNF) product open source project. CSNF is designed to overcome the challenge of interpreting the babel of security alerts and notifications emanating from various cloud service providers and the proliferation of disparate cloud-based services. The lack of standard practices for security notification syntax and…

Hyperautomation Working Group Update: The Age of Hyperautomation: Redefining Enterprise Efficiency

Join us for an enlightening session that explores the transformative power of Hyperautomation, AI/ML, and Full Stack Analytics in shaping the future of business. Discover how Hyperautomation streamlines operations, while AI/ML revolutionizes decision-making and automation. Explore Full Stack Analytics for comprehensive insights across technology layers. Gain practical insights and best practices for adoption and implementation. Unleash the potential of these technologies to drive innovation, growth, and data-driven decision-making. Don’t miss this opportunity to transform your business in the digital age. Agenda: -Exploring the transformative power…