USDA Fall Technology Day

Cyber Tech Day

Thursday September 24, 2020 9:30am - 1:30pm MDT

 
 










                   

Participation is encouraged from all USDA agency personnel and ISSA membership. This is an excellent opportunity to view and virtually demo the latest technology products and services, and to learn about best practices and strategies. There is no cost to attend and there will be many giveaways! There will also be informational cybersecurity briefings throughout the program. 

 






And Much More!







The Exhibit Showcase offers an excellent opportunity to learn about the latest advances in technology through an interactive approach with attendees. Participants will showcase their products and services for USDA attendees. The Exhibit Hall demonstrates new, innovative ideas and sharing solutions to your technology challenges.






  • COMPLIMENTARY LUNCH (e-gift card to GrubHub, Chipotle or Panera) for the first 150 people to register and participate. 

  • There will also be lots of other prizes - don't miss out! 

Sessions


All times are Mountain Time Printable Schedule || Times, presenters and sessions are subject to change.

9/24/2020

10:00 AM
-to-
10:25 AM


   
add_alert
Add to Calendar

The Move to Al Ops


Brian   Carnell

 

How do we get there from here? That’s the crucial question for agencies fielding more data more quickly than ever before. AI is quickly becoming the most effective tool to analyze, manage, and exploit the deluge of data and help IT Operations meet their Service Level Agreements. As an IT Operations group what are some of the key areas to focus on to bring AI into the fold? This session will explore the challenges of turning that influx into insight. We’ll hear how organizations have used AI to inform decision making, and how it is fueling a more resilient and efficient workforce.


9/24/2020

10:00 AM
-to-
10:25 AM


   
add_alert
Add to Calendar

Deploying a Work-from-Home Mobile Workspace for Government Workers


Dr. Bill  Anderson

 

Today's session presents how CIS Mobile's altOS secure mobility platform can deploy a secure Work-from-Home environment over-the-air to government workers.


Hosted by:


9/24/2020

10:30 AM
-to-
10:55 AM


   
add_alert
Add to Calendar

Empowering Modern Security Architecture and Operations with Identity Governance and Administration


Frank  Briguglio

 

The impact of cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. What this shows us is the perimeter as we know it is dead—the identity is the new attack vector.
 
Modern security architectures and frameworks such as Zero Trust and the NIST Cybersecurity Framework attempt to address these new challenges. This modernization requires a system of interconnected components working together to efficiently and confidently grant appropriate policy-driven access and identify known and unknown threats and to prevent or limit the damage done by nefarious actors. 
 
The method for addressing those threats follows the NIST Cybersecurity Framework functions – Identify, Protect, Detect, Respond, and Recover. For each function, we will look at how Identity Governance and Administration (IGA) plays a key role in keeping technology resources and data secure.
 
This session explores the power of the data-driven identity ecosystem to meet the demands of digital transformation and modernization in complex IT environments and how the identity is a critical component of the cybersecurity ecosystem. We dive into Identity Lifecycle Automation, Access Modeling and Least Privilege Access, and when integrated with SIEM and UEBA - the combined identity context, controls and policies deliver powerful threat detection and incident response/investigation.


Hosted by:


9/24/2020

10:30 AM
-to-
10:55 AM


   
add_alert
Add to Calendar

Safe Employees, Secure Business


Sam  Kumarsamy

 

Enabling a secure remote workforce is more critical than ever before. Whether you’re issuing more corporate-owned devices or enabling a BYOD program for remote employees, enabling secure and seamless access to authorized apps is a business imperative. MobileIron can help you get there.


9/24/2020

11:00 AM
-to-
11:25 AM


   
add_alert
Add to Calendar

Designing Effective Artificial Intelligence and Machine Learning Systems


Patrick  Biltgen

 

Designing effective artificial intelligence and machine learning systems that leverage these powerful capabilities requires an understanding of how modeling approaches fail. Perspecta's Patrick Biltgen reviews common problems with AI/ML models and recommends practical approaches to build more robust systems. Using entertaining examples, he explains basic concepts and provides solutions applicable across multiple fields.


9/24/2020

11:00 AM
-to-
11:25 AM


   
add_alert
Add to Calendar

Deep Security and Container Protection


James  Lewis

 

As organizations continue their adoption of containers, it has become critical to provide the most secure solution regardless of cloud provider or platform. Trend Micro™ Deep Security™ software provides comprehensive security in a single solution that is purpose-built for virtual, cloud, and container environments . This holistic solution allows for proper security for pre-runtime and at runtime deployments and provides consistent security protection across workloads. Deep Security also provides a rich set of application programming interfaces (APIs) so security can be automated and won’t impact your teams.

Hosted by:


9/24/2020

11:30 AM
-to-
11:55 AM


   
add_alert
Add to Calendar

Align IT with your Mission to Power Digital Transformation


Gregg  Ostrowski

 

With the evolution of digital services being so prominent in our daily lives, yet the complexity of the technology required to deliver a top-notch user experience.  The ability to find the needle in the haystack has become a problem for IT to proactively discover the issue before the end user.  Come hear how Cisco, WWT, AppDynamics and Thousand Eyes has stepped up to the challenge.

Hosted by:


9/24/2020

11:30 AM
-to-
11:55 AM


   
add_alert
Add to Calendar

Design Digital Workflows for any Process


Jake  Burman

 

Workflows are how we get work done. Digital workflows are how we get work done FAST! Find out why more and more businesses are transforming their everyday work processes into digital workflows on the Now Platform. With an easy to use Flow Designer, even the most inexperienced analyst or process owner can help bring work processes into the digital domain. And when those flows need to connect with other systems, applications or data, see how easy it is to use out-of-the-box integration spokes from IntegrationHub to keep those flows flowing! See for yourself the benefits of building your own better way to work on the Now Platform.

Hosted by:


9/24/2020

12:00 PM
-to-
12:25 PM


   
add_alert
Add to Calendar

Policy- based Automation for Backup and Recovery


David  Siles

 

Rubrik works with Federal agencies to meet their goals around being Efficient, Effective, and customer focused when it comes to data management. On prem- or in the cloud, Rubrik is able to apply automation to backups—increasing uptime for applications; all while giving you protection from malware via our DHS and DOD hardened solution.

Hosted by:


9/24/2020

12:00 PM
-to-
12:25 PM


   
add_alert
Add to Calendar

End-to-End monitoring and security with the Elastic Stack


Kent  Brake

 

Learn about end-to-end monitoring and security of large scale HPC, ICS, and traditional IT systems with the latest version of the Elastic Stack. 

We’ll start with an overview of the Elastic Stack. Then walk through the latest features and how they are relevant to organizations like CERN and ORNL. We will end with a demonstration of how ICS and traditional IT systems can use Elastic’s ML to detect and respond to anomalies of all types.


Hosted by:


9/24/2020

12:30 PM
-to-
1:35 PM


   
add_alert
Add to Calendar

Applying GAI's 7 Layer AI Technology Stack to USDA Mission Outcomes


Prem  Jadhwani

 

In this presentation, attendees will learn about the various mission-oriented use cases of AI such as Intelligent Video Analytics, Fraud Detection and Prevention, Insider Threat Detection and Prevention, Predictive Cyber Analytics, Hyper automation etc. The presentation will cover the 7 layer AI technology stack and the building blocks for a successful AI Implementation. The presentation will demonstrate how customers can leverage the power of GPUs, AI and ML to identify a broad range of malicious activities and threat hunting in real time. This presentation will outline how GAI’s HyperCAP 2.0 solution is using GPUs and AI algorithms to improve anomaly detection, compliance and operational analytics with more efficient machine learning, deep learning, and inferencing techniques. The presentation will also touch upon the best practices in protecting data security, ethics, fairness and governance in the AI/ML projects.


9/24/2020

12:30 PM
-to-
12:55 PM


   
add_alert
Add to Calendar

Leaping into The Edge with Your Best Parachute The Cloud


Nick  Howard

 

Computing is evolving at a rapid pace, we are no longer at the Edge but free falling into a need to adapt location, speed and budget constraints. Learn how the cloud is not a competitor, but an ally in navigating and optimizing the Edge for your digital transformation. This session will provide insight into new technology for cloud based solutions.


Hosted by:


EXHIBITORS




Gigamon provides intelligent traffic visibility solutions for enterprises, data centers, and service providers. We empower unmatched visibility into traffic, traversing both physical and virtual networks without affecting performance or stability of the production environment.




Federal Training Partnership proudly provides services in the government meeting and training fields. Our experienced team works hard to achieve our client's goals. FTP leadership has decades of experience in the government training arena, including everything from small onsite training events to large conventions with attendees and exhibitors numbering in the thousands. 




Dell Technologies provides the essential infrastructure for agencies to build their digital future, transform IT and protect their most important asset, information. The company services customers of all sizes with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.




Perspecta brings a diverse set of capabilities to U.S. government customers in defense, intelligence, civilian, health care and state and local markets. With offerings in mission services, digital transformation and enterprise operations, our 14,000 employees work tirelessly to not only execute the mission, but support the backbone that enables it. Learn more at www.perspecta.com




About SD3IT, LLC

Established in 2014, SD3IT, LLC is a woman owned, HUBZone, ISO:9001 2015 QMS registered company focused on providing driven solutions and services for the Federal Government and small business community around the globe. As a solution technology company with a proven track record, SD3IT designs custom solutions optimizing technology for storage, data center, virtualization, networking, and cyber security. We provide professional services such as project and risk management, operations and maintenance. We are an authorized Information Technology (IT) products seller. SD3IT delivers mission completion with a strong team and “people first” approach supported by a trusted partner ecosystem and our SD3IT Data Lab, enabling critical customer interactive experiences with new and existing technology.

 

About Hewlett Packard Enterprise

Hewlett Packard Enterprise is the global edge-to-cloud platform-as-a-service company that helps organizations accelerate outcomes by unlocking value from all of their data, everywhere. Built on decades of reimagining the future and innovating to advance the way we live and work, HPE delivers unique, open and intelligent technology solutions, with a consistent experience across all clouds and edges, to help customers develop new business models, engage in new ways, and increase operational performance. 




SailPoint, the leader in identity management, delivers an innovative approach to securing access across the enterprise with the SailPoint Predictive IdentityTM platform. The platform is designed to securely accelerate mission objectives while delivering adaptive security and continuous compliance. SailPoint provides a comprehensive view of access to all resources across multi-cloud infrastructure, and helps make faster, more informed access decisions, detect potential risks and easily enforce access policies for all users.




Government Acquisitions, Inc. (GAI) is a leader in providing practical, end-to-end IT solutions to the federal government focusing on Artificial Intelligence, Cyber Security, Big Data Analytics, Robotic Process Automation, Data Center Modernization, and Hybrid Cloud.  Backed by over 30 years’ experience, GAI’s team members work side-by-side with your agency and OEM partners to modernize, optimize, and deliver unparalleled mission support. Dedication is in our DNA. Mission is our mindset.




About Cask:

Headquartered in San Diego, California, Cask designs, enables, and sustains digital transformation on the NOW® platform for enterprise clients across both the private and public sectors. Cask is one of just a handful of companies that has achieved ServiceNow® Elite Partner status and the only partner to be honored with the ServiceNow®Americas Elite Partner of the Year award in January 2020 and the Golbal Elite Partner of the Year Award in May 2020.


Cask delivers end-to-end solutions to help organizations make the most of their ServiceNow investments, reducing cost, and improving quality of services across the enterprise. Cask’s portfolio includes strategy, implementation, modernization, digital transformation, and managed services that enable clients to execute an end-to-end digital vision. Cask consultants provide domain-focused solutions across IT, Human Resources, Security and Risk Management, Customer Service, Finance / Procurement, and Operations to modernize employee, customer, and constituent user experience. Cask’s approach integrates design thinking and organizational change management to help its customers transform the way they work.

About ServiceNow:

ServiceNow, Inc. engages in the provision of enterprise cloud computing solutions. It offers customer and facilities service management, orchestration core, service mapping, cloud and portfolio management, edge encryption, performance analytics, service portal designer, visual task boards and configuration management database. The firm offers its solutions for the industries under the categories of Healthcare, Education, Government and Financial services. 




Elastic is a search company that powers enterprise search, observability, and security solutions built on one technology stack that can be deployed anywhere. From monitoring and securing sensitive systems to powering search across public records, Elastic solutions help agency professionals mine and report on valuable information from log, network, geospatial, structured, unstructured, and cybersecurity data with self-managed and SaaS offerings. Learn more at elastic.co/federal.




DocuSign helps organizations connect and automate how they prepare, sign, act on, and manage agreements. As part of the DocuSign Agreement Cloud, DocuSign offers eSignature: the world's #1 way to sign electronically on practically any device, from almost anywhere, at any time. 

Business runs on agreements. Government business is no exception. More than 1,300 local, state, and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, prepopulated agreements, and automated approval processes.




Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information.  Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit www.trendmicro.com.





Rubrik is a cloud enabling solution. With the ability to protect your data on-prem or in the cloud, Rubrik was built for today’s current and future challenges – on-prem backup & recovery, cloud migration, cloud native backups, searchability no matter where data lives, and automation to reduce menial tasks.
As the only vendor certified with both the DoDIN and DHS APL, we are proud to offer world class data protection and an added layer of defense against
ransomware attacks.




AppDynamics enables federal agencies to understand and optimize the connections between application performance, user experience, and mission outcomes. In short, AppDynamics provides mission-focused analytics on critical applications. These data-derived insights enable federal organizations to:

See the entire application in real-time as it responds to individual end users and operates across the IT infrastructure. Using advanced machine learning and artificial intelligence, AppDynamics learns the performance of an application day-over-day, week-over-week, month-over-month, and establishes a dynamic baseline of its performance. When the application deviates from this baseline, AppDynamics alerts IT staff so they may spot and resolve potential performance problems long before they prompt end-user complaints or adversely impact the mission. AppDynamics’ deep visibility into every end user’s experience with an application allows agencies to understand how variables, such as a user’s location, browser version, or device type, might relate to an application performance problem that could affect mission outcomes.

Act quickly to identify and fix the root causes of potential problems and fine-tune an application — whether in development, test, or production — based on how the app is relating with its surrounding infrastructure.

Know critical trends in the application over time and, importantly, how that application is contributing to agency mission goals in specific terms and in real time.

Provide business intelligence to help agencies understand exactly how application performance contributes to or detracts from program and mission outcomes. Business IQ (BiQ) feature provides code-level visibility into application-based operations.

Our dashboard explains exactly how, when, and on which devices an application is being used; whether it is running as expected or abnormally; precisely how the application is interacting with the IT infrastructure supporting it; and how the application code or the IT infrastructure can be adjusted so the application can perform better and more reliably. 

Learn more about how AppDynamics can is helping federal agencies ipmprove their applications' performance and the mission outcomes they support during the virtual event or at appdynamics.com/government.




Acronis SCS is an American cyber protection and edge data security company exclusively dedicated to meeting the unique requirements of the US public sector. Our innovative and comprehensive cyber protection, backup and disaster recovery, anti-ransomware, and enterprise file sync and share software solutions ensure operational assurance and data security across America’s federal, state and local government, education, healthcare, and nonprofit computing environments.




MobileIron is redefining enterprise security with the industry’s first mobile-centric, zero trust platform built on a unified endpoint management (UEM) foundation to secure access and protect data across the perimeter-less enterprise. Zero trust is defined by a “never trust, always verify” approach to security. MobileIron’s mobile-centric, zero trust approach validates the device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats to ensure that only authorized users, devices, apps, and services can access business resources.




For more than thirty-five years, Targus has been implementing purposeful solutions to provide you with the tools you need to succeed – from laptop bags to tablet cases to peripherals and universal docking stations. Our insight-driven approach, global reach, and commitment to quality ensures we have the skills and experience to meet your performance, style, and protection needs – whether you’re a large enterprise, a small business, or an individual who needs to get work done. Our mission drives us, our passion fuels us, and our customers make us everyday, inspired.