Symantec Government Technology Summit    Sessions Abstract
•   Track 1; Session 1    Mobile Management    Jon Kuhn, Symantec    Symantec Mobile Management (SMM) is a scalable MDM pl...
•   Track 3; Mobile Demo    Endpoint Virtualization    Chris DAguanno, Symantec    This two part interactive demo with cov...
•   Track 1; Session 2    Risk Management    Kurt Van Etten, Symantec    Effective IT Risk Management: Translate, Influenc...
• Lunchtime General Session:  Joel Brenner  Joel Brenner is a former senior counsel at the National Security  Agency, wher...
• Track 3; Mobile Demo  Adam Licata, ITS  This session will show how you can secure and manage your mobile  devices using ...
• Track 1; Session 1  Mobile Management  Jon Kuhn, Symantec  Symantec Mobile Management (SMM) is a scalable MDM platform t...
• Track 2; Session 4  Electronic Data Discovery for Government  Bret Bailine, Clearwell  Tom Kennedy, Clearwell  Clearwell...
Upcoming SlideShare
Loading in …5
×

Symantec government technology summit abstract

585 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
585
On SlideShare
0
From Embeds
0
Number of Embeds
81
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Symantec government technology summit abstract

  1. 1. Symantec Government Technology Summit Sessions Abstract
  2. 2. • Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment.• Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  3. 3. • Track 3; Mobile Demo Endpoint Virtualization Chris DAguanno, Symantec This two part interactive demo with cover the following: Tips and Trick for Application Virtualization As application virtualization becomes more prevalent in production environments, we are beginning to move beyond simple stand-alone applications and into production applications. Production applications tend to be built on top of various frameworks (.NET, Java, etc.) as well as using low level system components (services and drivers). In this lab you will learn techniques that will help you virtualize complex applications, as well as how to configure applications to properly use dependencies and framework components. How To Simplify Application Management with Streaming In the dynamic and ever changing environment of todays enterprise, a flexible and automated method to provide software employees need to perform their daily duties is a must. The mobility and diversity of the end user community presents a challenge for traditional methods of software delivery. This lab will demonstrate the how application streaming will provide a more versatile platform for delivering applications to an end user community as well as mange the lifecycle of these applications in the enterprise. Attendees will gain an understanding of provisioning applications to AD users and Groups, license management and license optimization.
  4. 4. • Track 1; Session 2 Risk Management Kurt Van Etten, Symantec Effective IT Risk Management: Translate, Influence, Act Effective IT risk management requires security leaders to move beyond IT risk at the technology and device level. Rather, it is necessary to translate IT risk and map it to critical processes and groups within their organizations. From there, security leaders can drive the awareness and accountability they need to act on the critical risks that threaten their organizations. This session will present Symantecs approach to IT risk management, and illustrate how you can use the new capabilities in Symantec Control Compliance Suite 11.0 to more effectively manage IT risk in your organization.• Track 2; Session 2 Endpoint Security & Encryption Brian Tillet, Symantec Nothing is more important to government agencies today then a well secured IT environment, Symantecs information security solutions protect and secure data regardless of the device it is being accessed on, where it resides and whether it is in motion or in rest.
  5. 5. • Lunchtime General Session: Joel Brenner Joel Brenner is a former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. Previously, he served as the national counterintelligence executive in the Office of the Director of National Intelligence and as NSAs inspector general. He is a graduate of the University of Wisconsin-Madison (B.A.), The London School of Economics (Ph.D.), and Harvard Law School (J.D.). Brenner currently practices law in Washington, D.C., specializing in cyber-security and related issues. About the Book - A former top-level National Security Agency insider goes behind the headlines to explore Americas next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
  6. 6. • Track 3; Mobile Demo Adam Licata, ITS This session will show how you can secure and manage your mobile devices using Symantec Mobile Management. You will learn how security policies are created, applied, and reported on to determine compliance. In addition to managing device security, you will learn how to automatically provision new iPhones and iPads, so they can securely connect to your network and services.• Track 1; Session 4 The Endpoint Evolution Kawika Takayama, Symantec Mobility, Virtualization and the Emerging Workspace IT organizations are transforming their concept of traditional endpoint management as users demand greater device choices and expect instant access to corporate resources. These trends are driving IT to invest in technologies like mobile management, application streaming and virtualization. Symantecs new strategy around endpoint management, virtualization and mobility enables IT to deliver services and support to all computing architectures.
  7. 7. • Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment.• Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  8. 8. • Track 2; Session 4 Electronic Data Discovery for Government Bret Bailine, Clearwell Tom Kennedy, Clearwell Clearwells electronic data discovery software provides a complete, automated methodology for government organizations to respond to cases and conduct regulatory and internal investigations. Learn more about the Symantec Government Technology Summit speakers and sessions by following this link.

×