Cyber threats are bombarding DoD network defenses at a rapid pace and are threatening to undermine the United States' technological military advantage. In order to maintain military superiority, an integrated security strategy between the physical and virtual battlefield needs to be adopted.
The previous approach to securing data and systems has emphasized strong perimeter protection to keep threats on the outside of the network, but this model is not effective for handling new types of threats, such as advanced persistent threats, sophisticated insider threats, and coordinated attacks.
- Achieve a secure software defined data center (SDDC)
- Create a cost effective, cyber-resilient software defined infrastructure
- Provide seamless digital workspace integration between the virtual desktop and mobile environment
- Ensure compliance for mobile, virtual, and physical endpoints
Agenda
Time | Session |
---|
10:00am - 10:30am | Introduction |
10:30am - 1:00pm | Briefings and Working Lunch |
1:00pm - 1:30pm | Q&A |
1:30pm - 2:00pm | Networking |