Attend Training Seminars. Earn Education Credit Hours.

In addition to viewing exhibitor displays, attendees will have the opportunity on Tuesday, 18 July and Wednesday, 19 July to earn continuing education units (CEUs) or continuing professional education (CPE) credits by attending 45-minute training seminars and professional development panels. Tech Talks will be held in the Daedalian Room located adjacent to the Tech Expo exhibit hall in the Officers’ Club.

Reserve Your Seat



Keeping the Bad Guys Out, and Sharing Appropriate Information with Your Allies

Presented By: F5 Networks, Inc.

Learn how F5 authentication solutions can be deployed in many ways, this talk will focus on two potential uses cases:
– Multinational information sharing. F5 can be deployed as a federated identity management solution. A federated identity management solution can create bi-lateral or multi-lateral trust relationships whereby a user can authenticate and be provided with a user authentication ticket or token. The token can be trusted across multiple systems or organizations (countries).
– A solution that has been proposed via the DoD Privileged User Working group in response to a request for providing CAC/2 Factor Authentication to network terminals that do not provide strong two-factor authentication. The F5 Privileged User solution (enforcing strong authentication for critical infrastructure) solves the issue whereby in order for an administrator to gain access to network equipment, such as switches and routers, a smart card must be used to gain access. (Other two-factor mechanisms can be supported if needed.)


How to Improve Your Network's Security in the Age of Cyberattacks

Presented By: Corning Optical Communications

As cyber attacks increasingly plague networks around the world, optical fiber is increasingly recognized by network operators as the most secure medium for data transmission – hands down. Not only does fiber support the ever-increasing need for bandwidth and mission-critical systems, it forms the foundation for secure, reliable infrastructures. In short, there’s nothing more secure than fiber … or is there? The U.S. government and military think there is; they’re using a technology that monitors unauthorized tampering or intrusion attempts of classified fiber optic networks. We will walk you through the basics of fiber theory and the security advantages that fiber has over copper. Then they’ll explore local area network applications including campus backbone, building backbone, passive optical LAN, fiber to the desk, data centers, and storage area networks. You won’t want to miss this seminar, because at the end you’ll be able to design and select product for a secure physical infrastructure – and monitor for unauthorized tampering.


SolarWinds Technical Update and Training

Presented By: World Wide Technology, Inc. & SolarWinds

Join WWT and SolarWinds for a Technical update and training on SolarWinds IT management and monitoring solutions. In this interactive session, Eric Helgeson, WWT and Omar Rafik, SolarWinds will demonstrate, and answer questions on, the latest new features of most interest to government users, including:
• PerfStack™ dashboard – Cross-Stack IT Data Correlation for advanced troubleshooting
o Participating Products: Network Performance Monitor, NetFlow Traffic Analyzer, Server & Application Monitor, Virtualization Manager, Storage Resource Monitor, and Web Performance Monitor
• Network Performance Monitor 12.1 – Mute alerts by node, Arista® 7500E support, NetPath™ improvements, and support for Meraki® Wireless cloud-managed access points
• Network Configuration Manager 7.6 – Now with integrated firmware upgrade wizard for Cisco® IOS® devices
• VoIP & Network Quality Manager 4.4 – Support for Cisco Unified Call Manager 11.X, Support for Avaya Aura™ 6.3.x, and Web reporting and updated alerting
• Server & Application Monitor 6.4 – Cloud Infrastructure Monitoring, AWS® cloud monitoring, and Linux® agent enhancements
• Storage Resource Monitor 6.4 – IBM® XIV, Hardware Health monitoring, and Device framework
• Database Performance Analyzer 11.0 – Support for Azure® SQL and Amazon Aurora™,Oracle® Adaptive Plans, and SQL Server® Availability Group Status


Managing the Risk of Privileged Accounts & Privileged Passwords

Presented by: Quest

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

The federal government faces some unique challenges. They too must control the use of elevated privileges, but they need to find ways to PIV/CAC enable these accounts to meet mandates while still enabling administrators to administer.

You’ll learn about an approach that allows all privileged accounts to be vaulted and audited. This approach also meets requirements for password changes on accounts that can’t be CAC or PIV enabled but wraps those accounts with a secure, PIV/CAC-enabled check-in/check-out/auditing solution to know who is using the accounts and how they are being used.

The value of PIV-Enablement and the challenges
The various directives are pushing federal agencies to PIV-enable all access have created unique challenges. Agencies are forced to balance the functionality of critical applications or force a PIV-only environment. In this forum we will discuss the intent of PIV-enablement, the challenges it presents, and ways to provide or enhance functionality while meeting PIV compliance guidelines.

Modern Active Directory (AD) Security for Today’s Enterprise
Good news! AD is changing! Well, maybe that’s not really news. AD has been in a state of constant change in large enterprises since its inception. Within the Federal Government, a need for efficiency has caused many enterprises to reduce directories and merge to fewer and larger directories. The idea being, fewer directories are easier to manage and secure.

While this concept is sound, many of these enterprises miss the opportunity to properly secure them and are full of “one off” exceptions to rules. As usual, the exceptions become the rules. The larger the enterprise the stronger the policies need to be. Delegation without over-permissioning is always difficult in large enterprises. How can we grant the right permission to do the exact job?

Changes in AD also include Office 365 and Azure AD. If you’re considering using Azure AD and/or O365 then you need to consider how you are going to provide the same controls over your cloud AD as you do for your on-prem AD.
In this brief we will discuss how and when to define the proper policies, how to have strong yet flexible delegation, and how to enforce the strong policies that you have put in writing. We will also discuss how the policies and management you use for on-prem AD translate to the cloud.



Wireline Encryption for Secure Information Sharing Between Nations

Presented By: Ciena Government Solutions, Inc.

Advances in packet optical networking technology secures sharing of information between nation partners to protect the confidentiality and authentication of critical data.. Wireline encryption, built into the telecommunications modems on the line side of an optical path offers a number of unique advantages for information sharing. The most obvious advantage is the ability to encrypt large data flows at low cost, with the ability to scale to higher data rates as needed. A particular advantage for sharing between nations is that the encryption is built into the telecommunications equipment which does not require a separate device to be managed or maintained and can be deployed globally with very few export restrictions.  Network Functions Virtualization (NFV) allows network deployment of virtual network appliances, such as encryption devices and firewalls, wherever required. NFV enhanced with wireline encryption enables robust network infrastructures on an as needed basis to secure information sharing between nation partners. This talk will discuss the state of the art of both wireline encryption and NFV and explain how these technologies provide secure information sharing between nations.


Autonomous Defensive Cyber Operations

Presented By: TechNow, Inc.

Autonomous Defensive Cyber Operations (ADCO) automates vulnerability discovery and patching.  This seminar addresses common questions about ADCO:  1.) To what degree can ADCO be implemented and how effective is AI/Machine Learning applied to ADCO? 2.) With the goal of an autonomous protective controller with a global view and understanding, what are our steps forward? 3.) What will be the metrics and analytics utilized and workflow optimizations (playbooks)?  We will address challenge of the balance between human and machine capability.  DARPA Cyber Grand Challenge has inspired ADCO and an example Proof of Concept will be demonstrated.


What is the Real Value of Prefabricated Data Centers?

Presented By: Schneider Electric

The rationale for building on-premise data centers can vary greatly depending on a company’s business drivers, specific challenges, and size of installation. Whether deploying Edge applications or implementing a large data center, business managers need to determine the best strategy for investing in physical infrastructure. The decision to deploy capacity in a traditional building or space versus deploying a prefabricated solution has recently been a hotly-debated topic. While the argument commonly focuses on intangible comparisons and historical trends, a more practical review of the value and benefits of each solution should lead to a justifiable decision.


VMware Workspace One - Mobile Mobility and Desktop Anywhere

Presented by: VMware

Workspace ONE is a platform that enables our IT customers to empower their workforce to securely bring the technology of their choice (devices and apps) at the pace and cost the business needs.

Choice is key as it is one of the competitive differentiators for our offering. We have uniquely transformed and expanded the industry-leading EMM technology, AirWatch, into a device agnostic fabric across all major platforms of the future – iOS, Android, Win10, MacOS and ChromeOS using cloud-based APIs available for these platforms.. We’ve recently announced partnerships with industry leaders, includingMicrosoft, Dell-EMC, Google, Oracle and Samsung, that build upon our cross-cloud architecture and extend it to new solutions giving customers choice and flexibility in the infrastructure, applications and devices they use to create their digital workspaces.