Training Session Speakers

Achieving Information Dominance at the Edge

Tactical Edge Automation for agile Infrastructure Deployment

Session Abstract

NTS is putting an immediate focus on Edge Automation for agile infrastructure deployment, enhancing the ability to exchange critical information required to accomplish your mission in communications-limited environments. We will explore MANTLE, our automation platform, purpose-built for the edge, demonstrating how customers can automatically build their edge infrastructure, verifying that it meets operational intent by providing automated remediation to eliminate infrastructure problems quickly.

Tactical Data Operations

Session Abstract

Information has always been the key to success on and off the battlefield, but that success depends on having that information available at the right place at the right time. The transition to a “digital force” has data production and consumption growing at exponential rates. This provides unparalleled capability for an organization to execute operations faster with greater speed, accuracy, and lethality than at any point in history. Yet for all its advantages, the explosion of data operations poses challenges to ensuring the availability, integrity, and availability of that data. These challenges are amplified further in the resource-constrained tactical environments where the option to buy more gear or add more people is not a realistic course of action. The Cohesity team training session will be a scenario-driven discussion that focuses on data management and security in tactical operations. The training scenarios will cover: -Tactical Data Infrastructure — This scenario focuses on deployable assets that are deployed, maintained, and then returned to the garrison. During deployment, systems will have periods of reach back, but that may not always be consistent. Regardless of connectivity local data must be managed and secure and when possible deconflicted with strategic sources. We talk about the challenge of austere environment data management and how to apply technologies to ensure mission success. -Data and Application Mobility — In this scenario, the group will engage in a discussion about the aspects of keeping critical data and applications updated and positioned where needed. This functionality is crucial for a unit to maintain continuity of operations in a constantly evolving operation. We will talk about the implementation of technology that helps ensure data and application interoperability, security risk and mitigation, and data migration. For example, the US Army has the vision of a cross-domain, data and application “fabric” from the cloud to the data center to the tactical edge. The concept is that data and applications move freely across nodes participating in the mesh. -Operations Management — Data operations requires a core set of data management networking tools and extending the capabilities of a large, powerful collection of nodes. We talk about the requirement to establish global management mechanisms that are needed to aggregate and execute DoD missions across all echelons. The group will engage in overcoming challenges like inefficient IT operations, lack of data visibility and control, resource demands, and others. Data operations need to ensure healthy day-to-day operations of the data sharing system but also need insights into organic system growth. -Tactical Data Protection — The current state of tactical data protection (backup and recovery) is quite interesting. In this scenario, we consider what’s involved with protecting data in harsh and hostile environments. Physical security is a challenge. Certainly, hostile forces need to be denied access to data. Also, the tactical theater is notorious for limited data connectivity between locations. Given these challenges, the notion of data protection is often a secondary or lower priority. The goal of a scenario-based training session is to facilitate discussion between operators, planners, and industry to cultivate a shared understanding of the tactical data mission to ensure information availability as a combat multiplier.

Tactical Network Operations

Session Abstract

CodeMettle will train on its portfolio of products designed to simplify Network Operations. This will include management of critical components such as transmission (satcom, radio), network (route, switch), applications, and services. The training will also include the coordination and collaboration necessary for integrated NetOps across echelons.

Building a Multi-Cloud, Cyber Resilient Data Protection Strategy

Session Abstract

In this session, Dell Technologies will discuss how to leverage an as-a-service-centric, multi-cloud strategy for interoperability between on-prem and off-prem data protection. In addition, the pillars of a sound zero trust architecture will be discussed, and how Dell’s Cyber Recovery Vault can be a key component of a cyber resilient architecture.

90 Minutes Total
Presentation Time Description
0-5
Agenda Review and Introduction of Dell SOF Team Members at Forum
5-10
Dell Technologies Data Protection Capabilities Overview
10-20
Working definition of Cloud with SaaS centric approach
- Consumption model based
- Resource allocation and workload specific scenarios
20-40
Introduction of APEX Backup Service
- Dell SaaS offering for in-cloud protection of M365 suite
- Explanation of underlying consumption model via multi gov cloud approach
- Review of replication zone redundancy
- Look into APEX Backup Service interface via VPN into Dell Federal Lab in McLean VA
40-50
Time for Questions/overflow from material above/transition to next topic
50-60
Review of 4 Pillars of sound Zero Trust Architecture
- Good start but not enough for Cyber Resilient Architecture
60-80
Explanation and Review of Dell’s Cyber Recovery Vault
- Process Flow diagram of cyber attack -> demonstrate risk of architecture without Cyber Vault
- Review of Cyber Sense -> AI Tool that is brains of Cyber Vault
- Look into Cyber Vault GUI
80-90
Time for Questions/overflow from material above