Idaho National Laboratory - National & Homeland Security

Virtual Cyber Day


Tuesday September 1, 2020 (9:30AM - 1:30PM MDT)

 

 
 
 

        


 


Participation is encouraged from all Idaho National Laboratory personnel.

This is an excellent opportunity to view and virtually demo the latest technology products and services.
There will also be speaking sessions to learn about best practices and strategies.

There is no cost to attend and there will be many giveaways! 





 

Exhibitor Showcase:

The Exhibit Showcase offers an excellent opportunity to learn about the latest advances in technology through an interactive approach with attendees. Participants will showcase their products and services for INL attendees. 

The Exhibit Hall demonstrates new, innovative ideas and sharing solutions to your technology challenges.

Don't Miss Out!


COMPLIMENTARY LUNCH: 

 

gift card to a variety of local restaurants for the first 150 people to register and participate. 

 (including: Kneader's, Jaker's, Olive Garden, Stockman's, Applebee's)

There will also be lots of other prizes - don't miss out! 

Sessions


All times are Mountain Time Printable Schedule || Times, presenters and sessions are subject to change.

9:30 AM


   
add_alert
Add to Calendar

How does AI accelerate true threat detection & response?


David  Humphrey

 

Artificial intelligence and machine learning are transforming seemingly every aspect of our world. Within the security space, AI has completely changed the ability of teams to react and respond to threats.  In fact, a recent Capgemini study concluded that 69% of organizations believe that they will not be able to respond to security threats without AI. With a lack of resources, time, and people, many teams are inefficient at combatting security threats alone and must adopt forms of AI to be able to intelligently adapt. Join experts, David Humphrey and Stephan Jou as they discuss how artificial intelligence is being used in the security space today to protect organizations both physically and digitally to improve performance and reduce reliance on man hours. 

Sponsored by:


9:30 AM


   
add_alert
Add to Calendar

Mobile Enabling a Lab Workforce (And 5 Things I wish I'd Have Known Earlier)


Dan  Sleight

 

As much of the National Laboratory work-force has shifted from the cubicle farm to home offices, the need to provide parity across work platforms has never been greater. Doing so in a way that doesn’t compromise our security posture is challenging, but the effort is worth the benefit. I’ll discuss what INL intends to deliver on iOS and Android to its BYOD users, as well as some things I wish I’d have known (or believed) before we started.

Logos, Videos, Images - INL


10:00 AM


   
add_alert
Add to Calendar

What’s new from Apple


Tony  Greiner

 

Join us for the latest from Apple. We’ll be reviewing the newest hardware and OS updates from Apple, including some little known features, security enhancements and upcoming capabilities in macOS 11 Big Sur and iOS 14.

Sponsored by:


10:00 AM


   
add_alert
Add to Calendar

Safe Employees, Secure Business


Sam  Kumarsamy

 

Enabling a secure remote workforce is more critical than ever before. Whether you’re issuing more corporate-owned devices or enabling a BYOD program for remote employees, enabling secure and seamless access to authorized apps is a business imperative. MobileIron can help you get there.

Sponsored by:


10:30 AM


   
add_alert
Add to Calendar

The Move to AIOps


Brian  Carnell

 

How do we get there from here? That’s the crucial question for agencies fielding more data more quickly than ever before. AI is quickly becoming the most effective tool to analyze, manage, and exploit the deluge of data and help IT Operations meet their Service Level Agreements. As an IT Operations group what are some of the key areas to focus on to bring AI into the fold? This session will explore the challenges of turning that influx into insight. We’ll hear how the National Labs have used AI to inform decision making, and how it is fueling a more resilient and efficient workforce.

Sponsored by:


10:30 AM


   
add_alert
Add to Calendar

Protecting Sensitive Areas from Wireless Threats


John  Piccininni

 

The discussion will focus on the pervasiveness of wireless devices in today’s environment and the threats they may pose in sensitive areas, and the measures the government recommends to mitigate the threat, and tools you may apply to comply with directives such as NNSA ACD 470.6

Sponsored by:


11:00 AM


   
add_alert
Add to Calendar

End-to-End monitoring and security with the Elastic Stack


Kent  Brake

 

Learn about end-to-end monitoring and security of large scale HPC, ICS, and traditional IT systems with the latest version of the Elastic Stack. 
 
We’ll start with an overview of the Elastic Stack. Then walk through the latest features and how they are relevant to organizations like CERN and ORNL. We will end with a demonstration of how ICS and traditional IT systems can use Elastic’s ML to detect and respond to anomalies of all types.


Sponsored by:


11:00 AM


   
add_alert
Add to Calendar

Securing Mobile Devices for Federal Secure Spaces


Blake  Kotiza

 

Blake Kotiza, Privoro’s Vice President of Sales, provides an overview of the mobile operating environment for federal agencies, discusses how Privoro’s SafeCase platform can enable agencies to introduce smartphones into secure spaces in compliance with policies like CNSS Directive No. 510 and NNSA’s ACD 470.6 and demonstrates how SafeCase blocks the meaningful capture of audio and visual data while enabling policy enforcement.

Sponsored by:


11:30 AM


   
add_alert
Add to Calendar

Digital Transformation Checklist:Key Attributes For Successful Platform-Based Digital Transformation


Chris  Radich

 

How might a government or defense agency establish an enterprise platform and drive long-term digital transformation within their organization?

Join our 25 minute session to learn about our best practice checklist and get prepared to lead your organization's cloud based transformation. You will never think about digital transformation the same again.


Sponsored by:


11:30 AM


   
add_alert
Add to Calendar

Deploying a Work-from-Home Mobile Workspace for Government Workers


Dr. Bill  Anderson

 

Today's session presents how CIS Mobile's altOS secure mobility platform can deploy a secure Work-from-Home environment over-the-air to government workers.

Sponsored by:


12:00 PM


   
add_alert
Add to Calendar

Unlock the Potential Within Your Unstructured Data


Andrew  Balzarini

 

Wildflower introduces PowerScale by Dell EMC

Sponsored by:


12:30 PM
-to-
12:55 PM


   
add_alert
Add to Calendar

Fireside chit-chat on cybersecurity


Richard "Chit"  Chitamitre

 

Corelight’s Richard “Chit” Chitamitre talks with Idaho National Laboratory’s Troy Moore about challenges facing SOCs today, advice on improving cybersecurity, plus a few interesting stories -- including what it was like to work with Edward Snowden at the NSA.

Sponsored by:


1:00 PM


   
add_alert
Add to Calendar

Data Science for Product Design, Manufacturing and Operation: Going Beyond Buzzwords


Fatma  Kocer-Poyraz

 

Data Science for Product Design, Manufacturing and Operation:
Going Beyond Buzzwords


Every day that passes we learn about successful applications of machine learning and ways it can be applied in our daily lives. Every industry is working towards leveraging new techniques and tools to solve every day problems and continuously learn from them. Design and engineering are no different. Even though machine learning is not a new concept, applications of machine learning for design and manufacturing  are relatively new due to recent developments in overcoming challenges with working with 3D shapes, emulating experts, augmenting data using simulations. In this presentation, I will discuss state-of-the art  use of machine learning for product design and manufacturing as well as show some recent applications.

 


Sponsored by:


10:30 AM
-to-
11:00 AM


   
add_alert
Add to Calendar

Teams Test Session


Andrew  Balzarini

 

Teams Test Session Description 


EXHIBITORS




Federal Training Partnership proudly provides services in the government meeting and training fields. Our experienced team works hard to achieve our client's goals. FTP leadership has decades of experience in the government training arena, including everything from small onsite training events to large conventions with attendees and exhibitors numbering in the thousands. 




Wildflower International Ltd, is a small, minority-owned, woman-owned, HUBZone business, serving the Federal Government and its National Laboratories for three decades. We have long-term experience delivering comprehensive information technology products, services, and solutions with a proven record of accomplishments. Our solutions are available via a variety of contract vehicles inlcuding, CHESS ITES-3H, SEWP V, DHS First Source II, DOE ICPT, SCMC, and GSA. We are a Dell Federal Titanium Partner and were awarded Juniper Networks Federal Partner of the Year for both 2018 & 2019.




Corelight gives defenders unparalleled insight into networks to help them protect the world’s most critical organizations and companies. Based in San Francisco, Corelight is an open-core company founded by the creators of Zeek, the widely-used NSM tool




Dell Technologies provides the essential infrastructure for agencies to build their digital future, transform IT and protect their most important asset, information. The company services customers of all sizes with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.




Elastic is a search company that powers enterprise search, observability, and security solutions built on one technology stack that can be deployed anywhere. From monitoring and securing sensitive systems to powering search across public records, Elastic solutions help agency professionals mine and report on valuable information from log, network, geospatial, structured, unstructured, and cybersecurity data with self-managed and SaaS offerings. Learn more at elastic.co/federal.




HOLMANS has been a leading provider of IT product solutions for government and business for over 40 years. HOLMANS offers a wide array of services to meet the needs of any organization. HOLMANS' customers receive best-in-class services such as national sales and service centers, dedicated inventory, customized eCommerce solutions, asset management, and more! HOLMANS strives to achieve the highest level of customer satisfaction by delivering exceptional service and support.




Micro Focus Government Solutions helps you run and transform your federal, state, or local agency. Driven by customer-centric innovation, our software provides the critical tools you need to build, operate, secure, and analyze your organization in a constantly changing world. That means powering your digital transformation with solutions spanning four key areas:

  • Enterprise DevOps—Deliver at high speed with low risk

  • Hybrid IT Management—Simplify your IT transformation

  • Security, Risk & Governance—Secure what matters most

  • Predictive Analytics—Analyze in time to act

These solutions bridge the gap between existing and emerging technologies so you can innovate faster and with less risk in the race to digital transformation. 

For more information, visit
www.microfocusgov.com




Salesforce transforms the way departments, agencies, and their community of contractors meet the unique demands of today’s constituent and more effectively deliver on their mission. With the innovation of the Customer 360 for Government, Salesforce is helping government strengthen public trust. The FedRAMP-authorized Salesforce Government Cloud - the world’s #1 enterprise cloud, built for government – gives stakeholders the mobile, self-service tools they need to connect data, process, and people while also reducing the risk, cost, and complexity of traditional IT. Salesforce’s trusted cloud accelerates transformation to rapidly deploy solutions with a multi-tenant cloud infrastructure that meets all security and compliance requirements.




Absolute is the first and only company to offer uncompromised visibility and near real-time remediation of security breaches at the source. Our Absolute Persistence self-healing endpoint security technology gives security and IT pros complete control over their devices and data. No other technology has the power to withstand user error or malicious attacks, and return devices to an original state of safety and efficacy.




MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on a unified endpoint management (UEM) foundation to secure access and protect data across the perimeter-less enterprise. Zero trust is defined by a “never trust, always verify” approach to security. MobileIron’s mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats to ensure that only authorized users, devices, apps, and services can access business resources.





Privoro is leading the way in mobile security hardware systems – enabling organizations to adopt a zero trust posture against commercial mobile devices while delivering high-security services and unsurpassed control.




For more than thirty-five years, Targus has been implementing purposeful solutions to provide you with the tools you need to succeed – from laptop bags to tablet cases to peripherals and universal docking stations. Our insight-driven approach, global reach, and commitment to quality ensures we have the skills and experience to meet your performance, style, and protection needs – whether you’re a large enterprise, a small business, or an individual who needs to get work done. Our mission drives us, our passion fuels us, and our customers make us everyday, inspired.




Founded in 1992, Westwind provides comprehensive, integrated IT products and services to government agencies as well as commercial enterprises throughout the US. We have expertise in emerging technology (3D print services, and unmanned vehicles), life-cycle management, and integrated solutions (computers, peripherals, data centers, AV equipment, and secure networking). Over the years, Westwind has established strong partnerships with a variety of vendors to provide our customer with the best products and services while meeting their contracting needs.




Altair is a global technology company that provides software and cloud solutions in the areas of product development, high performance computing (HPC) and data analytics. Altair enables organizations across broad industry segments to compete more effectively in a connected world while creating a more sustainable future. To learn more, please visit www.altair.com.




At CommScope Federal, we push the boundaries of communications technology to create the world’s most advanced networks. Across the globe, our partners and their solutions are redefining connectivity, solving today’s challenges and driving the innovation that will meet the needs of what’s next.




Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations most critical data and IP, while driving digital transformation and growth. Rather than offering a static one-size fits all approach that stifles innovation and creates vulnerabilities, Forcepoint is attuned to how people interact with data, providing secure access while enabling employees to create value. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform to protect network users and cloud access, prevent confidential data from leaving the corporate
network, and eliminate breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers in more than 150 countries. Assurance Data is an IT Consultant and Forcepoint Partner. We work with organizations to defend and mitigate advanced security threats.




LogRhythm empowers more than 4,000 customers across the globe to measurably mature
their security operations program. LogRhythm’s award-winning NextGen SIEM Platform delivers
comprehensive security analytics; user and entity behavior analytics (UEBA); network detection
and response (NDR); and security orchestration, automation, and response (SOAR) within a single,
integrated platform for rapid detection, response, and neutralization of threats. Built by security
professionals for security professionals, LogRhythm enables security professionals at leading
organizations like Cargill, NASA, and XcelEnergy to promote visibility for their cybersecurity
program and reduce risk to their organization each and every day. LogRhythm is the only provider
to earn the Gartner Peer Insights’ Customer Choice for SIEM designation three years in a row. To
learn more, please visit logrhythm.com.




Pure transforms the government's journey toward IT Modernization by delivering a modern data experience that empowers agencies to run their operations as an automated, storage as-a-service model seamlessly across multiple clouds. One of the fastest-growing enterprise IT companies in history, Pure helps customers put data to use while reducing the complexity and expense of managing their infrastructure.




Quantum Federal Goverment

Agencies are under pressure to modernize storage infrastructure to meet today’s data management challenges. Whether it’s converging backup and archive, consolidating data centers, taking advantage of new cloud technologies, protecting assets from ransomware, or delivering high-performance shared storage to support mission-critical ISR workflows, Quantum storage solutions fit the bill while helping government agencies meet stringent compliance mandates.




Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.




RSA offers mission-driven security solutions that provide a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user access; and reduce business risk, fraud and cybercrime. Learn more at rsa.com/publicsector.





Rubrik is a cloud enabling solution. With the ability to protect your data on-prem or in the cloud, Rubrik was built for today’s current and future challenges – on-prem backup & recovery, cloud migration, cloud native backups, searchability no matter where data lives, and automation to reduce menial tasks.
As the only vendor certified with both the DoDIN and DHS APL, we are proud to offer world class data protection and an added layer of defense against
ransomware attacks.




Tanium offers a unified endpoint management and security platform that is built for the world’s most demanding IT environments. Many of the world’s largest and most sophisticated organizations, including nearly half of the Fortune 100, top retailers and financial institutions, and all six branches of the US Armed Forces rely on Tanium to make confident decisions, operate efficiently and effectively, and remain resilient against disruption. Tanium ranks 7th on the Forbes list of “Top 100 Private Companies in Cloud Computing” for 2019 and 10th on FORTUNE’s list of the “100 Best Medium Workplaces.”


 






Zscaler works with government agencies, such as INL, to securely transform their networks and applications for a mobile and cloud-first world. The FedRAMP-certified Zscaler platform provides fast, secure connections without appliances. 




Advanced Computer Solutions an, Idaho Falls based, woman owned, small business specialiizing in cybersecurity, network, datacenter, desktop, and virtual solutions. With over 20 years experience and the highest industry certifications, our technicians have the ability to support any IT issue. Partnering with several top vendors and distributors we can provide sales and service to most IT silos. 




To help you maintain business continuity and prevent downtime, Eaton offers a comprehensive portfolio of backup power and distribution equipment, protecting you from a host of threats, including power outages, surges and lighting strikes. Eaton also provides a suite of power management products to enable you to monitor and control your power infrastructure. 

Eaton is a leading provider of backup power UPS, or uninterruptible power supply. Eaton UPSs deliver high quality, reliable backup power for everything from network closets and server rooms to enterprise and colocation data centers. 




Fortinet (NASDAQ: FTNT) provides federal government customers with complete visibility and control across the expanding attack surface and the power to take on ever-increasing performance requirements today and in the future.

The federal government owns some of the world’s most sensitive—and coveted—data. Compromised systems can lead to disastrous consequences—for national security, the economy, and technological innovation. By providing integration, automation, compliance, and performance at scale, Fortinet offers federal agencies world-class solutions for on-premises perimeter security, secure remote access, multi-domain networks, advanced threat protection, zero-trust network access, operational and security awareness, third-party and insider threat protection, and many other needs. Learn more at www.FortinetFederal.com.

Certs: Our certifications/lists include FIPS 140-2, USGv6, NIAP Common Criteria, DoDIN APL, NSA Commercial Solutions for Classified Programs (CSfC) Components List, and CDM.




The IEEE Xplore® Digital Library is your gateway to trusted research— journals, conferences, standards, ebooks, analytics solutions and educational courses—with over 5 million articles to help you fuel imagination, build from previous research, and inspire new ideas.
 
IEEE 
Xplore opens a world of knowledge from many industries to enable you to improve or discover the next breakthrough. With powerful search tools to help you find only the most relevant research, IEEE Xplore delivers the information your company needs.    
 
For more information on how to gain access for your organization, please visit innovate.ieee.org or email ieeexplore@ieee.org




Walker and Associates is a national distributor of network products for broadband providers, including wireline, wireless, cable TV, government and enterprise network operators.  Walker’s extensive range of products from over 250 suppliers facilitates carriers’ delivery of high speed internet, video, data and voice services to residential, business, and mobile users.  




KELYN Technologies is an innovative leader in understanding data management, data growth, and providing modern day solutions to manage data storage and backups.  We specialize in fully customizable on-premise, cloud or hybrid solutions to meet your data management needs.  

Commvault is a recognized global leader in data readiness. We’re committed to ensuring you can store, protect, manage, and use your data in a heterogenous and multi-tenancy environment that is easy to use. Always. Commvault capabilities work on-prem,and in the cloud,with the digital tools and procedures you’re already using. Make your data resilient and actionable with a single capability.  




LEVERAGE is a national full-service integrator of technology-based business solutions that span the enterprise, serving the diverse business needs of large public and private organizations across America.




Founded in 1980 with headquarters in San Antonio, TX, Sirius is a privately held, leading national solutions integrator focused on helping organizations transform their business by managing their operations, optimizing their IT, and securing it all. With over 2,600 employees, multiple offices across the U.S., and a team of experts with more than 5,500 professional and technical certifications, the Sirius team specializes in IT Strategy (Infrastructure and Operations), Security, Business Innovation (Digital and Data), Cloud, and Managed Services. Sirius solutions are built on proven technologies from top strategic partners, and delivered by the brightest minds in the business.




CIS Mobile has a mission to address Government needs for a modern, convenient, and secure mobility platform. 

Mobility powers extraordinary capabilities for organizations, but also introduces significant new operational risks. Our altOS platform is designed to ensure optimal protection for mission-critical operations with the latest off-the-shelf smartphones. 

CIS Mobile is the subsidiary of CIS Secure Computing, an industry leader and global provider for designing and manufacturing secure communications and computing solutions for Governments and Enterprises. 




Inpixon is a world leader in indoor intelligence. Our indoor location and data platforms and patented technologies empower users to harness the power of indoor data to create actionable intelligence. We specialize in capturing, interpreting and visualizing indoor data to make indoor spaces smarter, safer and more secure.

Our solutions are leveraged by a multitude of industries and disciplines to do good with indoor data. This multidisciplinary depiction of indoor data enables users to increase revenue, decrease costs, and enhance safety. Inpixon customers can take advantage of mapping, positioning, analytics, sensor fusion and the Internet of Things (IoT) to uncover the untold stories of the indoors.