To allow as many Symposium attendees as possible access to Track 5 content, it will be made available in both virtual and in-person formats. The sessions included in this track are specially curated content meant for senior IT leaders, project managers, C-level executives, cybersecurity professionals, and engineers that aren't interested in certification boot camps. This quick hitting, diverse content will touch on relevant topics ranging from Zero Trust, securing applications across all your cloud environments with one WAF, what does a modern application architecture look like, cybersecurity threat research torn right out of current headlines, an overview of F5's next gen platforms and finally a look at our portfolio offerings that integrate with SUSE Rancher and Red Hat OpenShift.
11:00am – 11:30am
Fireside Chat with F5 Public Sector CTO’s:
Join F5 Public Sector CTO’s in an informal venue discussing industry trends along with the various challenges SLED and Federal customers face in today’s complex IT landscape. Topics will also include current and future product roadmap insights on F5 technologies and services. Attendees will be able to ask questions during the session.
11:30am – 12:30pm
F5 One WAF:
It’s an evolving arms race to protect your apps and mitigate the threats against them. Every time the “good guys” step up our game, attackers try, and sometimes succeed, to leapfrog the enhancements. How can you ensure that your applications remain protected with a baseline of security—including a web application firewall (WAF), denial-of-service (DoS) attack protection, and now API protection—that will serve as a sturdy, dependable foundation for your application layer security defense? Learn how F5’s application layer security portfolio provides the sturdy, formidable foundation required to address today’s ever-growing, sophisticated application threat landscape. See how F5’s powerful one WAF engine enables the robust, innovative application protection you need in the consumption and deployment modes you want, addressing the application models you use—whenever and wherever you need it.
1:15pm – 2:15pm
Zero Trust, Making Sense Today / Tomorrow:
The zero trust approach of “never trust, always verify” is critical as the threat landscape is more targeted and advanced. But what’s really necessary in today’s zero trust architecture, and how can it best be implemented? While many vendors are bringing zero trust network access solutions to market focused on securing users and devices, is that enough? Join us to discuss what it means to have a holistic zero trust approach and the gaps in security that must be overcome to be successful. Learn more about F5’s vision for extending zero trust access to users and devices (including ZTNA products) and how we can go beyond that to embed zero trust within the very fabric of the business ecosystem (workload, service, server, network, and API).
2:30pm – 3:30pm
Mitigating Attack Vectors with Insights from F5 Labs:
Once upon a time, cybercriminals focused on a single targeted vector when launching an attack. Now, they’ve stolen a page from the “good guys”: if security can be layered, why can’t attacks? This will include the latest threat research from the recent State of Application Security report. More attacks on agencies today incorporate attacks across multiple vectors to deliver one, consolidated attack stream. It isn’t uncommon for a company to be hit by a phishing campaign that spreads credential thieving malware along with a ransomware attack coupled with a distributed denial-of-service (DDoS) attack. The nefarious thinking is to overwhelm the agency, so it’ll be more willing to pay a ransom to stop all the attacks. It’s a shrewd but despicable way to stress an organization to its breaking point. To help you mitigate attacks of this nature, F5’s portfolio of market-leading security and application delivery controller (ADC) products can be deployed in a mode to stop each attack while continuing to deliver strong, continuous protection for your organization, data, and users.