Tenable Triple-T: Bridging the Security Gap with Cloud Native Vulnerability Management

As organizations move to the cloud, security teams are being tasked with cloud security. This often means replicating on-prem security practices in complex multi-cloud environments. This approach can leave critical blindspots and create organizational inefficiencies. In this session join Alex Feigenson, Director of Security Engineering at Tenable to hear how you can use a CNAPP solution to empower your teams to become cloud security experts and work across departments for better security outcomes. You’ll learn how you can make the best use of your security…

IBM Triple-T: Maximize Application Performance and User Experience with End-to-End App-Centric Connectivity

Agile and high performing digital services require high performing user-to-app and app-to-app connectivity. But when it comes to providing connectivity to highly distributed applications and services, current networks that are largely independent from the applications with rigid, unsecure and reactive mode of operations fall short in delivering a consistent and predictable user experience. But what if multicloud networks put the needs of applications first? In this session, discover the power of app-centric connectivity where the network follows the application for agile and reliant application performance.

Navigating the Shadows: Understanding the Risks of Shadow AI in Large Enterprises

In the rapidly evolving landscape of artificial intelligence, the phenomenon of shadow AI—unofficial AI projects operating without formal oversight—poses unique challenges for large enterprises. This panel discussion delves into the complexities of shadow AI, examining its risks, including security vulnerabilities, data silos, and inefficiencies. Our expert panelists will share insights and strategies for identifying shadow AI initiatives within the organizational framework, understanding whether they align with corporate governance, data privacy standards, and operational goals. Agenda: -Brief overview of shadow AI and its prevalence in large…

AI at the Helm: Transforming Enterprise Infrastructure with Intelligence

In this dynamic panel session moderated by Andy Brown, Aryo Kresnadi of FedEx, Mike Taylor of WWT, and Hasan Siraj of Broadcom will converge to discuss the revolutionary impact of AI on enterprise compute infrastructure. Following their insightful keynotes at the AI Networking Summit, this discussion will delve into the nuances of cybersecurity, networking, and the lifecycle management of AI-driven solutions. The panel will explore real-world applications, emerging trends, and strategic insights into harnessing AI for enhancing enterprise security, networking efficiency, and overall infrastructure management….

Keynote – Shaping the Future: Enterprise AI Infrastructure and Innovations in AI Networking

As the digital and AI-driven revolution continues to unfold, the demand for robust Enterprise AI infrastructure has never been more critical. Mike Taylor, CTO of WWT, stands at the helm of this transformation, steering the WWT AI Proving Ground within the Advanced Technology Center (ATC) towards groundbreaking innovations. This keynote will explore the pivotal role of Enterprise AI infrastructure in supporting complex AI workloads and the exciting emergence of new AI-native networking products across the industry. Through the lens of WWT’s state-of-the-art lab environment, attendees…

Keynote: Cisco’s Security Vision and the Transformative Impact of AI on Security

Join Tom Gillis, SVP/GM Security at Cisco, as he unveils Cisco’s forward-thinking approach to cybersecurity, “Cisco’s Security Vision and the Transformative Impact of AI on Security”. Through a live demonstration, Tom will showcase Cisco’s revolutionary, from-the-ground-up approach where security meets the network. He will also discuss the pivotal role of AI in eliminating operational burden, simplifying security infrastructure, and reinforcing trust within enterprise compute infrastructure. This session provides a comprehensive look into the evolution of cybersecurity, guided by Cisco’s expertise. Agenda: Introduction to Cisco’s Security…

AI-Driven Transformation: Best Practices in Network Security Policy Management

In an era where digital transformation is paramount, many organizations find themselves entangled in the complexity of managing legacy network security policies, hindering their ability to adapt and thrive. The “AI-Driven Transformation: Best Practices in Network Security Policy Management” panel at the AI Networking Summit during ONUG Spring and Fall 2024 conferences is designed to address this critical challenge. Our expert panel will delve into how AI and machine learning can be leveraged to streamline and enhance legacy network security policy management, significantly reducing technical…

CSNF Capture the Flag Wrap Up – Sponsored by World Wide Technology, Oracle, and Splunk

The CSNF Capture the Flag wrap-up session will provide participants with the the opportunity to weigh in on the advantages of utilizing CSNF when analyzing complex multicloud security threats. The Q&A session with key members of the ONUG CSNF project team will allow participants to ask questions and get feedback from the CSNF Project Team based on their experience of using it over the 2 day Capture the Flag event. The session will close with the awarding of prizes to the CSNF CTF winners and…

CSNF Capture the Flag Kickoff – Sponsored by World Wide Technology, Oracle, and Splunk

Compete against other SOC practitioners to identify multicloud security threats in several simulated scenarios created using WWT’s Cyber Range. The goal is for participants to discover, in a hands-on environment, the benefits of using ONUG’s open source “Cloud Security Notification Framework” (CSNF) to normalize service provider-specific security notification messages in complex, multicloud threat scenarios. Participants in the CSNF Capture The Flag Event must attend this kick-off session, in which they will: Meet the other players participating in-person at ONUG Spring 2024 Meet key members of…

Oracle Triple-T: Enhancing NOC and SOC Operations with RAG and Fine-Tuned Language Models

In the rapidly evolving landscape of cyber security, the ability to swiftly generate comprehensive and accurate security reports is paramount and NOC and SOC operators. This session showcases an advanced approach that leverages Retrieval-Augmented Generation (RAG) and fine-tuned Large Language Models (LLMs), such as Cohere and Llama2, to automate the creation of detailed security reports. By incorporating account telemetry and network traffic logs as RAG, this method enhances the report’s contextuality and relevance, ensuring precise and insightful incident narratives and breach analyses. A focal point…