SlideShare a Scribd company logo
1 of 8
Symantec Government
 Technology Summit
    Sessions Abstract
•   Track 1; Session 1
    Mobile Management
    Jon Kuhn, Symantec
    Symantec Mobile Management (SMM) is a scalable MDM platform that
    enterprises can rely on to enable, secure and manage mobile devices. SMM
    enables enterprise-wide mobile email and application rollouts, safeguards
    mobile data and devices and provides comprehensive visibility and control of
    the mobile environment.

•   Track 2; Session 1
    User Authentication for Government
    Nick Piazzola, Symantec
    Managed or on-premise PKI and cloud-based two-factor authentication
    solutions for Federal, state, and local agencies and government contractors
•   Track 3; Mobile Demo
    Endpoint Virtualization
    Chris D'Aguanno, Symantec
    This two part interactive demo with cover the following:
    Tips and Trick for Application Virtualization
    As application virtualization becomes more prevalent in production
    environments, we are beginning to move beyond simple stand-alone
    applications and into production applications. Production applications tend to
    be built on top of various frameworks (.NET, Java, etc.) as well as using low
    level system components (services and drivers). In this lab you will learn
    techniques that will help you virtualize complex applications, as well as how to
    configure applications to properly use dependencies and framework
    components.
    How To Simplify Application Management with Streaming
    In the dynamic and ever changing environment of today's enterprise, a flexible
    and automated method to provide software employees need to perform their
    daily duties is a must. The mobility and diversity of the end user community
    presents a challenge for traditional methods of software delivery.
    This lab will demonstrate the how application streaming will provide a more
    versatile platform for delivering applications to an end user community as well
    as mange the lifecycle of these applications in the enterprise. Attendees will
    gain an understanding of provisioning applications to AD users and
    Groups, license management and license optimization.
•   Track 1; Session 2
    Risk Management
    Kurt Van Etten, Symantec
    Effective IT Risk Management: Translate, Influence, Act
    Effective IT risk management requires security leaders to move beyond IT risk
    at the technology and device level. Rather, it is necessary to translate IT risk
    and map it to critical processes and groups within their organizations. From
    there, security leaders can drive the awareness and accountability they need
    to act on the critical risks that threaten their organizations. This session will
    present Symantec's approach to IT risk management, and illustrate how you
    can use the new capabilities in Symantec Control Compliance Suite 11.0 to
    more effectively manage IT risk in your organization.

•   Track 2; Session 2
    Endpoint Security & Encryption
    Brian Tillet, Symantec
    Nothing is more important to government agencies today then a well secured
    IT environment, Symantec's information security solutions protect and secure
    data regardless of the device it is being accessed on, where it resides and
    whether it is in motion or in rest.
• Lunchtime General Session:
  Joel Brenner

  Joel Brenner is a former senior counsel at the National Security
  Agency, where he advised on legal and policy issues relating to network
  security. Previously, he served as the national counterintelligence
  executive in the Office of the Director of National Intelligence and as NSA's
  inspector general. He is a graduate of the University of Wisconsin-Madison
  (B.A.), The London School of Economics (Ph.D.), and Harvard Law School
  (J.D.). Brenner currently practices law in Washington, D.C., specializing in
  cyber-security and related issues.

  About the Book - A former top-level National Security Agency insider goes
  behind the headlines to explore America's next great battleground: digital
  security. An urgent wake-up call that identifies our foes; unveils their
  methods; and charts the dire consequences for government, business, and
  individuals.
• Track 3; Mobile Demo
  Adam Licata, ITS
  This session will show how you can secure and manage your mobile
  devices using Symantec Mobile Management. You will learn how security
  policies are created, applied, and reported on to determine compliance. In
  addition to managing device security, you will learn how to automatically
  provision new iPhones and iPads, so they can securely connect to your
  network and services.

• Track 1; Session 4
  The Endpoint Evolution
  Kawika Takayama, Symantec
  Mobility, Virtualization and the Emerging Workspace
  IT organizations are transforming their concept of traditional endpoint
  management as user's demand greater device choices and expect instant
  access to corporate resources. These trends are driving IT to invest in
  technologies like mobile management, application streaming and
  virtualization. Symantec's new strategy around endpoint
  management, virtualization and mobility enables IT to deliver services and
  support to all computing architectures.
• Track 1; Session 1
  Mobile Management
  Jon Kuhn, Symantec
  Symantec Mobile Management (SMM) is a scalable MDM platform that
  enterprises can rely on to enable, secure and manage mobile devices.
  SMM enables enterprise-wide mobile email and application rollouts,
  safeguards mobile data and devices and provides comprehensive visibility
  and control of the mobile environment.

• Track 2; Session 1
  User Authentication for Government
  Nick Piazzola, Symantec
  Managed or on-premise PKI and cloud-based two-factor authentication
  solutions for Federal, state, and local agencies and government
  contractors
• Track 2; Session 4
  Electronic Data Discovery for Government
  Bret Bailine, Clearwell
  Tom Kennedy, Clearwell
  Clearwell's electronic data discovery software provides a
  complete, automated methodology for government organizations to
  respond to cases and conduct regulatory and internal investigations.




 Learn more about the Symantec Government Technology Summit speakers
                    and sessions by following this link.

More Related Content

What's hot

Business Logic Monitoring Primer
Business Logic Monitoring PrimerBusiness Logic Monitoring Primer
Business Logic Monitoring PrimerRocco Magnotta
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinderObserveIT
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioIvanti
 
Management Structures for IT Security
Management Structures for IT SecurityManagement Structures for IT Security
Management Structures for IT Securityzohraz
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsEswar Publications
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorCONFENIS 2012
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 

What's hot (19)

Business Logic Monitoring Primer
Business Logic Monitoring PrimerBusiness Logic Monitoring Primer
Business Logic Monitoring Primer
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder3 steps to 4x the risk coverage of CA ControlMinder
3 steps to 4x the risk coverage of CA ControlMinder
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
Management Structures for IT Security
Management Structures for IT SecurityManagement Structures for IT Security
Management Structures for IT Security
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 

Similar to Symantec government technology summit abstract

What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityCincoC
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 IssuePatrick Spencer
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printjames morris
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecuritySonaliG6
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum CopyLblum1234
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersCrawsec
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS Accelerite
 

Similar to Symantec government technology summit abstract (20)

What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
188
188188
188
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 

More from Carahsoft

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark FactsCarahsoft
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement SpeakersCarahsoft
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data DiscoveryCarahsoft
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint EvolutionCarahsoft
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and RemediationCarahsoft
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 

More from Carahsoft (12)

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement Speakers
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Symantec government technology summit abstract

  • 1. Symantec Government Technology Summit Sessions Abstract
  • 2. Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment. • Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  • 3. Track 3; Mobile Demo Endpoint Virtualization Chris D'Aguanno, Symantec This two part interactive demo with cover the following: Tips and Trick for Application Virtualization As application virtualization becomes more prevalent in production environments, we are beginning to move beyond simple stand-alone applications and into production applications. Production applications tend to be built on top of various frameworks (.NET, Java, etc.) as well as using low level system components (services and drivers). In this lab you will learn techniques that will help you virtualize complex applications, as well as how to configure applications to properly use dependencies and framework components. How To Simplify Application Management with Streaming In the dynamic and ever changing environment of today's enterprise, a flexible and automated method to provide software employees need to perform their daily duties is a must. The mobility and diversity of the end user community presents a challenge for traditional methods of software delivery. This lab will demonstrate the how application streaming will provide a more versatile platform for delivering applications to an end user community as well as mange the lifecycle of these applications in the enterprise. Attendees will gain an understanding of provisioning applications to AD users and Groups, license management and license optimization.
  • 4. Track 1; Session 2 Risk Management Kurt Van Etten, Symantec Effective IT Risk Management: Translate, Influence, Act Effective IT risk management requires security leaders to move beyond IT risk at the technology and device level. Rather, it is necessary to translate IT risk and map it to critical processes and groups within their organizations. From there, security leaders can drive the awareness and accountability they need to act on the critical risks that threaten their organizations. This session will present Symantec's approach to IT risk management, and illustrate how you can use the new capabilities in Symantec Control Compliance Suite 11.0 to more effectively manage IT risk in your organization. • Track 2; Session 2 Endpoint Security & Encryption Brian Tillet, Symantec Nothing is more important to government agencies today then a well secured IT environment, Symantec's information security solutions protect and secure data regardless of the device it is being accessed on, where it resides and whether it is in motion or in rest.
  • 5. • Lunchtime General Session: Joel Brenner Joel Brenner is a former senior counsel at the National Security Agency, where he advised on legal and policy issues relating to network security. Previously, he served as the national counterintelligence executive in the Office of the Director of National Intelligence and as NSA's inspector general. He is a graduate of the University of Wisconsin-Madison (B.A.), The London School of Economics (Ph.D.), and Harvard Law School (J.D.). Brenner currently practices law in Washington, D.C., specializing in cyber-security and related issues. About the Book - A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
  • 6. • Track 3; Mobile Demo Adam Licata, ITS This session will show how you can secure and manage your mobile devices using Symantec Mobile Management. You will learn how security policies are created, applied, and reported on to determine compliance. In addition to managing device security, you will learn how to automatically provision new iPhones and iPads, so they can securely connect to your network and services. • Track 1; Session 4 The Endpoint Evolution Kawika Takayama, Symantec Mobility, Virtualization and the Emerging Workspace IT organizations are transforming their concept of traditional endpoint management as user's demand greater device choices and expect instant access to corporate resources. These trends are driving IT to invest in technologies like mobile management, application streaming and virtualization. Symantec's new strategy around endpoint management, virtualization and mobility enables IT to deliver services and support to all computing architectures.
  • 7. • Track 1; Session 1 Mobile Management Jon Kuhn, Symantec Symantec Mobile Management (SMM) is a scalable MDM platform that enterprises can rely on to enable, secure and manage mobile devices. SMM enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides comprehensive visibility and control of the mobile environment. • Track 2; Session 1 User Authentication for Government Nick Piazzola, Symantec Managed or on-premise PKI and cloud-based two-factor authentication solutions for Federal, state, and local agencies and government contractors
  • 8. • Track 2; Session 4 Electronic Data Discovery for Government Bret Bailine, Clearwell Tom Kennedy, Clearwell Clearwell's electronic data discovery software provides a complete, automated methodology for government organizations to respond to cases and conduct regulatory and internal investigations. Learn more about the Symantec Government Technology Summit speakers and sessions by following this link.