SlideShare une entreprise Scribd logo
1  sur  10
Symantec Government
 Technology Summit
    Sessions Abstract
•   Opening General Session:
    Jennifer Nowell, Symantec

    Jennifer Nowell is the director of the Government Solutions Group for
    Symantec Public Sector.

    In this role, Nowell leads strategic functions associated with Symantec’s Public
    Sector business – working with U.S. federal, state and local governments as
    well as education institutions to improve their ability to protect and manage
    critical information. She brings comprehensive and long-term security
    solutions to the U.S. Public Sector in cooperation with government
    organizations, integrators and other leading security vendors.

    Nowell has served in a variety of roles during an 11-year tenure at
    Symantec, most recently serving as the senior account executive for the
    Department of Homeland Security. She joined Symantec in 1998 via the
    acquisition on Axent Technologies as a Federal Senior System Engineer.
•   Track 1; Session 1
    Mobile Management
    Jon Kuhn, Symantec
    Symantec Mobile Management (SMM) is a scalable MDM platform that
    enterprises can rely on to enable, secure and manage mobile devices. SMM
    enables enterprise-wide mobile email and application rollouts, safeguards
    mobile data and devices and provides comprehensive visibility and control of
    the mobile environment.

•   Track 2; Session 1
    User Authentication for Government
    Nick Piazzola, Symantec
    Managed or on-premise PKI and cloud-based two-factor authentication
    solutions for Federal, state, and local agencies and government contractors
•   Track 3; Mobile Demo
    Endpoint Virtualization
    Chris D'Aguanno, Symantec
    This two part interactive demo with cover the following:
    Tips and Trick for Application Virtualization
    As application virtualization becomes more prevalent in production
    environments, we are beginning to move beyond simple stand-alone
    applications and into production applications. Production applications tend to
    be built on top of various frameworks (.NET, Java, etc.) as well as using low
    level system components (services and drivers). In this lab you will learn
    techniques that will help you virtualize complex applications, as well as how to
    configure applications to properly use dependencies and framework
    components.
    How To Simplify Application Management with Streaming
    In the dynamic and ever changing environment of today's enterprise, a flexible
    and automated method to provide software employees need to perform their
    daily duties is a must. The mobility and diversity of the end user community
    presents a challenge for traditional methods of software delivery.
    This lab will demonstrate the how application streaming will provide a more
    versatile platform for delivering applications to an end user community as well
    as mange the lifecycle of these applications in the enterprise. Attendees will
    gain an understanding of provisioning applications to AD users and
    Groups, license management and license optimization.
•   Track 1; Session 2
    Risk Management
    Kurt Van Etten, Symantec
    Effective IT Risk Management: Translate, Influence, Act
    Effective IT risk management requires security leaders to move beyond IT risk
    at the technology and device level. Rather, it is necessary to translate IT risk
    and map it to critical processes and groups within their organizations. From
    there, security leaders can drive the awareness and accountability they need
    to act on the critical risks that threaten their organizations. This session will
    present Symantec's approach to IT risk management, and illustrate how you
    can use the new capabilities in Symantec Control Compliance Suite 11.0 to
    more effectively manage IT risk in your organization.

•   Track 2; Session 2
    Endpoint Security & Encryption
    Brian Tillet, Symantec
    Nothing is more important to government agencies today then a well secured
    IT environment, Symantec's information security solutions protect and secure
    data regardless of the device it is being accessed on, where it resides and
    whether it is in motion or in rest.
• Lunchtime General Session:
  Joel Brenner

  Joel Brenner is a former senior counsel at the National Security
  Agency, where he advised on legal and policy issues relating to network
  security. Previously, he served as the national counterintelligence
  executive in the Office of the Director of National Intelligence and as NSA's
  inspector general. He is a graduate of the University of Wisconsin-Madison
  (B.A.), The London School of Economics (Ph.D.), and Harvard Law School
  (J.D.). Brenner currently practices law in Washington, D.C., specializing in
  cyber-security and related issues.

  About the Book - A former top-level National Security Agency insider goes
  behind the headlines to explore America's next great battleground: digital
  security. An urgent wake-up call that identifies our foes; unveils their
  methods; and charts the dire consequences for government, business, and
  individuals.
• Track 3; Mobile Demo
  Adam Licata, ITS
  This session will show how you can secure and manage your mobile
  devices using Symantec Mobile Management. You will learn how security
  policies are created, applied, and reported on to determine compliance. In
  addition to managing device security, you will learn how to automatically
  provision new iPhones and iPads, so they can securely connect to your
  network and services.

• Track 1; Session 4
  The Endpoint Evolution
  Kawika Takayama, Symantec
  Mobility, Virtualization and the Emerging Workspace
  IT organizations are transforming their concept of traditional endpoint
  management as user's demand greater device choices and expect instant
  access to corporate resources. These trends are driving IT to invest in
  technologies like mobile management, application streaming and
  virtualization. Symantec's new strategy around endpoint
  management, virtualization and mobility enables IT to deliver services and
  support to all computing architectures.
• Track 1; Session 1
  Mobile Management
  Jon Kuhn, Symantec
  Symantec Mobile Management (SMM) is a scalable MDM platform that
  enterprises can rely on to enable, secure and manage mobile devices.
  SMM enables enterprise-wide mobile email and application
  rollouts, safeguards mobile data and devices and provides comprehensive
  visibility and control of the mobile environment.

• Track 2; Session 1
  User Authentication for Government
  Nick Piazzola, Symantec
  Managed or on-premise PKI and cloud-based two-factor authentication
  solutions for Federal, state, and local agencies and government
  contractors
• Track 2; Session 4
  Electronic Data Discovery for Government
  Bret Bailine, Clearwell
  Tom Kennedy, Clearwell
  Clearwell's electronic data discovery software provides a
  complete, automated methodology for government organizations to
  respond to cases and conduct regulatory and internal investigations.



                         Additional Information:
1.   Learn more about the Symantec Government Technology Summit’s
     speakers and sessions by following this link.

2.   You can vote on which “virtual” breakout sessions we will watch live via
     Facebook by answering our series of Polls on our Facebook Wall.
Don’t forget about our special giveaway!
              How about a sweet treat?
              Can you guess how many M&M’s are in this
              Carahsoft tumbler? Join us on Facebook for this
              exclusive giveaway for attendees at the Symantec
              Government Technology Summit.
              How do I play?

              1.   Become a fan at www.facebook.com/carahsoft.

              2.   Look for the photo of the tumbler on our wall.

              3.   Add a comment to the photo, telling us how
                   many
                   M&M’s you think are in the tumbler!

              4.   At the end of the day, we’ll announce the
                   winner
                   live at the event.

Contenu connexe

Tendances

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology ChallengesInfinity Technologies
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the OpportunityDean Iacovelli
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 

Tendances (20)

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Computing safety
Computing safetyComputing safety
Computing safety
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 

En vedette

Government technology
Government technologyGovernment technology
Government technologymulaganipr
 
Center for Technology in Government
Center for Technology in GovernmentCenter for Technology in Government
Center for Technology in Governmentopengovpartnership
 
Open Source Training
Open Source Training Open Source Training
Open Source Training GovLoop
 
GovLoop Guide: Government Technology Year in Review
GovLoop Guide: Government Technology Year in ReviewGovLoop Guide: Government Technology Year in Review
GovLoop Guide: Government Technology Year in ReviewGovLoop
 
The State of Communications
The State of CommunicationsThe State of Communications
The State of CommunicationsGovLoop
 
Identifying the Promise of GIS for Government
Identifying the Promise of GIS for GovernmentIdentifying the Promise of GIS for Government
Identifying the Promise of GIS for GovernmentGovLoop
 

En vedette (6)

Government technology
Government technologyGovernment technology
Government technology
 
Center for Technology in Government
Center for Technology in GovernmentCenter for Technology in Government
Center for Technology in Government
 
Open Source Training
Open Source Training Open Source Training
Open Source Training
 
GovLoop Guide: Government Technology Year in Review
GovLoop Guide: Government Technology Year in ReviewGovLoop Guide: Government Technology Year in Review
GovLoop Guide: Government Technology Year in Review
 
The State of Communications
The State of CommunicationsThe State of Communications
The State of Communications
 
Identifying the Promise of GIS for Government
Identifying the Promise of GIS for GovernmentIdentifying the Promise of GIS for Government
Identifying the Promise of GIS for Government
 

Similaire à Symantec Government Technology Summit

CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 IssuePatrick Spencer
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELIJCSEIT Journal
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1Clay Melugin
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS Accelerite
 
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & MicrosoftCCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & Microsoftwalk2talk srl
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 

Similaire à Symantec Government Technology Summit (20)

CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
188
188188
188
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & MicrosoftCCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 

Plus de Carahsoft

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark FactsCarahsoft
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement SpeakersCarahsoft
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data DiscoveryCarahsoft
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint EvolutionCarahsoft
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and RemediationCarahsoft
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 

Plus de Carahsoft (12)

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement Speakers
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Symantec Government Technology Summit

  • 1. Symantec Government Technology Summit Sessions Abstract
  • 2. Opening General Session: Jennifer Nowell, Symantec Jennifer Nowell is the director of the Government Solutions Group for Symantec Public Sector. In this role, Nowell leads strategic functions associated with Symantec’s Public Sector business – working with U.S. federal, state and local governments as well as education institutions to improve their ability to protect and manage critical information. She brings comprehensive and long-term security solutions to the U.S. Public Sector in cooperation with government organizations, integrators and other leading security vendors. Nowell has served in a variety of roles during an 11-year tenure at Symantec, most recently serving as the senior account executive for the Department of Homeland Security. She joined Symantec in 1998 via the acquisition on Axent Technologies as a Federal Senior System Engineer.
  • 3. Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment. • Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  • 4. Track 3; Mobile Demo Endpoint Virtualization Chris D'Aguanno, Symantec This two part interactive demo with cover the following: Tips and Trick for Application Virtualization As application virtualization becomes more prevalent in production environments, we are beginning to move beyond simple stand-alone applications and into production applications. Production applications tend to be built on top of various frameworks (.NET, Java, etc.) as well as using low level system components (services and drivers). In this lab you will learn techniques that will help you virtualize complex applications, as well as how to configure applications to properly use dependencies and framework components. How To Simplify Application Management with Streaming In the dynamic and ever changing environment of today's enterprise, a flexible and automated method to provide software employees need to perform their daily duties is a must. The mobility and diversity of the end user community presents a challenge for traditional methods of software delivery. This lab will demonstrate the how application streaming will provide a more versatile platform for delivering applications to an end user community as well as mange the lifecycle of these applications in the enterprise. Attendees will gain an understanding of provisioning applications to AD users and Groups, license management and license optimization.
  • 5. Track 1; Session 2 Risk Management Kurt Van Etten, Symantec Effective IT Risk Management: Translate, Influence, Act Effective IT risk management requires security leaders to move beyond IT risk at the technology and device level. Rather, it is necessary to translate IT risk and map it to critical processes and groups within their organizations. From there, security leaders can drive the awareness and accountability they need to act on the critical risks that threaten their organizations. This session will present Symantec's approach to IT risk management, and illustrate how you can use the new capabilities in Symantec Control Compliance Suite 11.0 to more effectively manage IT risk in your organization. • Track 2; Session 2 Endpoint Security & Encryption Brian Tillet, Symantec Nothing is more important to government agencies today then a well secured IT environment, Symantec's information security solutions protect and secure data regardless of the device it is being accessed on, where it resides and whether it is in motion or in rest.
  • 6. • Lunchtime General Session: Joel Brenner Joel Brenner is a former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. Previously, he served as the national counterintelligence executive in the Office of the Director of National Intelligence and as NSA's inspector general. He is a graduate of the University of Wisconsin-Madison (B.A.), The London School of Economics (Ph.D.), and Harvard Law School (J.D.). Brenner currently practices law in Washington, D.C., specializing in cyber-security and related issues. About the Book - A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
  • 7. • Track 3; Mobile Demo Adam Licata, ITS This session will show how you can secure and manage your mobile devices using Symantec Mobile Management. You will learn how security policies are created, applied, and reported on to determine compliance. In addition to managing device security, you will learn how to automatically provision new iPhones and iPads, so they can securely connect to your network and services. • Track 1; Session 4 The Endpoint Evolution Kawika Takayama, Symantec Mobility, Virtualization and the Emerging Workspace IT organizations are transforming their concept of traditional endpoint management as user's demand greater device choices and expect instant access to corporate resources. These trends are driving IT to invest in technologies like mobile management, application streaming and virtualization. Symantec's new strategy around endpoint management, virtualization and mobility enables IT to deliver services and support to all computing architectures.
  • 8. • Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment. • Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  • 9. • Track 2; Session 4 Electronic Data Discovery for Government Bret Bailine, Clearwell Tom Kennedy, Clearwell Clearwell's electronic data discovery software provides a complete, automated methodology for government organizations to respond to cases and conduct regulatory and internal investigations. Additional Information: 1. Learn more about the Symantec Government Technology Summit’s speakers and sessions by following this link. 2. You can vote on which “virtual” breakout sessions we will watch live via Facebook by answering our series of Polls on our Facebook Wall.
  • 10. Don’t forget about our special giveaway! How about a sweet treat? Can you guess how many M&M’s are in this Carahsoft tumbler? Join us on Facebook for this exclusive giveaway for attendees at the Symantec Government Technology Summit. How do I play? 1. Become a fan at www.facebook.com/carahsoft. 2. Look for the photo of the tumbler on our wall. 3. Add a comment to the photo, telling us how many M&M’s you think are in the tumbler! 4. At the end of the day, we’ll announce the winner live at the event.