WEDNESDAY | MAY 11 | ALL DAY
TechStrong Con, Techstrong Live’s most prestigious event will be in-person (and virtual following) at the InnoTech Dallas Conference. TechStrong Con continues to serve as a testament to the ways in which technology can improve human existence. Digital transformation, DevOps, cloud-native and cybersecurity all have played major roles in enabling organizations to move beyond survival mode and offer transformative and experiential services and environments that are shaping the new normal.
|8:30 AM - 4:00 PM|
|Exhibit Hall B||Networking||Expo Hall Open|
|9:00 AM - 9:50 AM|
|Room 4||Security||The New World Order: Crypto, Disinformation and War||Roy E. Hadley, Jr. - Adams and Reese LLC|
Russia’s invasion of Ukraine has upended our vision of the world order. In this session, we will discuss how the current state of the world forces us to look at technology, information and our everyday lives through a new lens, as what we thought was clear isn’t so clear anymore.
|Junior Ballroom D||InnoTech||Going Beyond “Lift and Shift” - Getting the Most Out of the Cloud||Michael Agarwal - Datavail|
As companies increasingly migrate to the cloud, they are looking for more than simple cost savings. What was once the main reason for cloud migrations – moving away from heavy Capex investments in hardware and infrastructure, toward more predictable and flexible Opex, is only the beginning. In order to take full advantage of the cloud and benefit from all that it offers, and glean competitive advantages including real innovation and enhanced speed to market, organizations need to truly go beyond just “lift and shift.” However, they may not know how to get there, and determine a roadmap, tech stack, best practices, methodologies, etc. In this presentation, we will address the different approaches of cloud migration, and describe how organizations can migrate to the cloud in a way that not only minimizes their costs but as importantly achieves new capabilities and other benefits. This presentation will address the business drivers and expectations that are now leading the way for cloud migrations, as well as how and why to formulate different cloud strategies such as rehosting, replatforming, and refactoring. Other topics will be covered such as whether or not to migrate or decompose monolithic applications, and how to choose from a variety of cloud tools, technologies and platforms.
|9:50 AM - 10:30 AM|
|Exhibit Hall B||Networking||Exhibits, Demos, and Coffee Break (Sponsored by Harness)|
|10:30 AM - 11:20 AM|
|Room 4||Security||The Good, The Bad, The Hacked||Donovan Farrow - Alias|
The way you handle a cyber-attack is critical to your business’s recovery. In this presentation, Donovan Farrow will teach you the proper ways to react in the event of a cyber-attack. As an incident responder, he's worked countless incident response engagements. Hear firsthand stories about businesses that had a good incident response plan, businesses that had a bad incident response plan execution, and businesses that responded so poorly they couldn’t recover. Learn about the good, the bad, and the hacked.
|10:30 AM - 11:20 PM|
|Room 2||Data Analytics and AI||Out of the Crisis - What Would Deming Do?||John Willis - Red Hat|
In 1982 Dr. Edwards Deming published a book called "Out of the Crisis." dealing with his frustration leading up from the prior decade. He was 82 years old; he wasn't writing this as a get-rich management consulting book. Dr. Deming wrote it as a stark warning for everyone, manufacturing, healthcare, government, and education alike. Fast forward forty years, and imagine what he would say today if he were alive today. Take, for example, the Knight Capital story, a configuration mistake in a High Frequency Trading (HFT) algorithm that purchased an errant 150 different stocks in 45 minutes, at a total cost of around $7 billion. In this presentation, we will look at the Knight Capital incident through some fundamental DevOps principles with the lens of Dr. Demings System of Profound Knowledge.
|11:30 AM - 1:00 PM|
|Exhibit Hall A, First Floor (Enter through Exhibit Hall B)||Luncheon||Preparing For the Next Global Event, How to Weaponize Cloud Computing Today Capitalize on a Quickly Changing World||David Linthicum - Deloitte Consulting|
It’s no secret that during the global pandemic some companies did very well, and some companies not so much. Even enterprises in the same market space, and relatively the same size. Why did some succeed during adversity, and others fail? For most it was the ability to weaponize technology to provide flexibility for both their workforce and their customers in how they deal with the company, as well as its products and services. Also, it was the ability to see the bigger picture, and invest in technology when everyone else was laying off workers, removing some products from inventory, and just preparing for failure. So, it’s apparent that not only the brave and the visionary won, but those that leverage technologies such as cloud computing as a true force multiplier for their business. Adding the ability to scale, work around global disruptions such as COVID, and provide a business where volatility to be turned into business opportunities. Would you like to understand how? In this presentation David Linthicum will take you through the process of rethinking how your enterprise operates, and how to turn cloud computing into an indispensable weapon that will double revenue in a few short years, and turning worldwide disruptions into opportunities for revenue and job growth that most did not see coming.
|1:00 PM - 1:50 PM|
|Junior Ballroom D||InnoTech||Hacking Your Brain for Better Cybersecurity!||George Finney - SMU|
The first step in your journey towards becoming secure is believing that you can be successful. Many of us are conditioned to believe we need to be cynical in order to be secure. In George's award-winning book, Well Aware, he demonstrates that the opposite is true...we can hack our own brain's "habit loop" to make being more secure easy. George will provide a roadmap on how to use the science behind habits that can help make security possible for anyone. Attendees will be able to:
|2:00 PM - 2:50 PM|
|Junior Ballroom C||Techstrong TV Live Broadcast||Peeling the Onion: Making Sense of the Layers of API Security||Matt Tesauro - Noname Security|
APIs are everywhere. Any business with a mobile app, modern web apps (SPAs), using the cloud, doing a digital transformation, integrating with business partners, running microservices or using kubernetes has APIs. There's a good foundation of AppSec knowledge out there - thanks in part to OWASP but API Security isn't exactly the same as AppSec. Additional complexity is part of the landscape with multiple competing API technologies like REST, gRPC and GraphQL plus stakeholders spread across multiple parts of the business. How do you make sense of the API Security landscape? This talk will cover the three fundamental areas to consider, the various chess pieces and the many ways those pieces can be put on your API chessboard. The goal is for you to leave knowing how to map out your API Security landscape and reach a state of solid API Security.
|Room 2||Data Analytics and AI||Organizing For the Future of Application Development||JP Morgenthal - DXC.Technology|
This session will focus on how application development is changing given democratization and automation. Topics covered: the impact of low code and citizen development, how DevOps must be part of your future to attract the right talent, how to balance packaged versus custom in an API-driven world, how cloud changes everything.
|2:45 PM - 3:30 PM|
|Exhibit Hall B||Networking||Happy 45-Minute Reception|
|Exhibit Hall B||Networking||Happy 45-Minute Reception, Sponsored by Red Hat|
|3:30 PM - 4:20 PM|
|Room 1||IT Leadership||Open Source and DevOps||Mitch Ashley - Techstrong Group|
Jeffrey Barnes - Remote Operations
Tom Sweet - GM Financials
Open source software is everywhere. Many organizations are using open source tools to build and operate their products, and even more have open source components included inside of the products and services they deliver. But, how do organizations know which components are in use, and what value they are getting?
Thank you to our Techstrong Con Sponsors: