2. • Track 1; Session 1
Mobile Management
Jon Kuhn, Symantec
Symantec Mobile Management (SMM) is a scalable MDM platform that
enterprises can rely on to enable, secure and manage mobile devices. SMM
enables enterprise-wide mobile email and application rollouts, safeguards
mobile data and devices and provides comprehensive visibility and control of
the mobile environment.
• Track 2; Session 1
User Authentication for Government
Nick Piazzola, Symantec
Managed or on-premise PKI and cloud-based two-factor authentication
solutions for Federal, state, and local agencies and government contractors
3. • Track 3; Mobile Demo
Endpoint Virtualization
Chris D'Aguanno, Symantec
This two part interactive demo with cover the following:
Tips and Trick for Application Virtualization
As application virtualization becomes more prevalent in production
environments, we are beginning to move beyond simple stand-alone
applications and into production applications. Production applications tend to
be built on top of various frameworks (.NET, Java, etc.) as well as using low
level system components (services and drivers). In this lab you will learn
techniques that will help you virtualize complex applications, as well as how to
configure applications to properly use dependencies and framework
components.
How To Simplify Application Management with Streaming
In the dynamic and ever changing environment of today's enterprise, a flexible
and automated method to provide software employees need to perform their
daily duties is a must. The mobility and diversity of the end user community
presents a challenge for traditional methods of software delivery.
This lab will demonstrate the how application streaming will provide a more
versatile platform for delivering applications to an end user community as well
as mange the lifecycle of these applications in the enterprise. Attendees will
gain an understanding of provisioning applications to AD users and
Groups, license management and license optimization.
4. • Track 1; Session 2
Risk Management
Kurt Van Etten, Symantec
Effective IT Risk Management: Translate, Influence, Act
Effective IT risk management requires security leaders to move beyond IT risk
at the technology and device level. Rather, it is necessary to translate IT risk
and map it to critical processes and groups within their organizations. From
there, security leaders can drive the awareness and accountability they need
to act on the critical risks that threaten their organizations. This session will
present Symantec's approach to IT risk management, and illustrate how you
can use the new capabilities in Symantec Control Compliance Suite 11.0 to
more effectively manage IT risk in your organization.
• Track 2; Session 2
Endpoint Security & Encryption
Brian Tillet, Symantec
Nothing is more important to government agencies today then a well secured
IT environment, Symantec's information security solutions protect and secure
data regardless of the device it is being accessed on, where it resides and
whether it is in motion or in rest.
5. • Lunchtime General Session:
Joel Brenner
Joel Brenner is a former senior counsel at the National Security
Agency, where he advised on legal and policy issues relating to network
security. Previously, he served as the national counterintelligence
executive in the Office of the Director of National Intelligence and as NSA's
inspector general. He is a graduate of the University of Wisconsin-Madison
(B.A.), The London School of Economics (Ph.D.), and Harvard Law School
(J.D.). Brenner currently practices law in Washington, D.C., specializing in
cyber-security and related issues.
About the Book - A former top-level National Security Agency insider goes
behind the headlines to explore America's next great battleground: digital
security. An urgent wake-up call that identifies our foes; unveils their
methods; and charts the dire consequences for government, business, and
individuals.
6. • Track 3; Mobile Demo
Adam Licata, ITS
This session will show how you can secure and manage your mobile
devices using Symantec Mobile Management. You will learn how security
policies are created, applied, and reported on to determine compliance. In
addition to managing device security, you will learn how to automatically
provision new iPhones and iPads, so they can securely connect to your
network and services.
• Track 1; Session 4
The Endpoint Evolution
Kawika Takayama, Symantec
Mobility, Virtualization and the Emerging Workspace
IT organizations are transforming their concept of traditional endpoint
management as user's demand greater device choices and expect instant
access to corporate resources. These trends are driving IT to invest in
technologies like mobile management, application streaming and
virtualization. Symantec's new strategy around endpoint
management, virtualization and mobility enables IT to deliver services and
support to all computing architectures.
7. • Track 1; Session 1
Mobile Management
Jon Kuhn, Symantec
Symantec Mobile Management (SMM) is a scalable MDM platform that
enterprises can rely on to enable, secure and manage mobile devices.
SMM enables enterprise-wide mobile email and application rollouts,
safeguards mobile data and devices and provides comprehensive visibility
and control of the mobile environment.
• Track 2; Session 1
User Authentication for Government
Nick Piazzola, Symantec
Managed or on-premise PKI and cloud-based two-factor authentication
solutions for Federal, state, and local agencies and government
contractors
8. • Track 2; Session 4
Electronic Data Discovery for Government
Bret Bailine, Clearwell
Tom Kennedy, Clearwell
Clearwell's electronic data discovery software provides a
complete, automated methodology for government organizations to
respond to cases and conduct regulatory and internal investigations.
Learn more about the Symantec Government Technology Summit speakers
and sessions by following this link.