Educational Session Formats
Educational Session Formats
Level-Set - $595
Level-set tutorials are half-day educational sessions designed to provide our clients with a practical, independent foundation in the areas being covered. These level-sets help prepare our clients for the topics being covered at the main conference and provide background future-state technology and business decisions. Note, we plan to add adding additional level-sets to and you can transfer your registration to another session.
Workshop - $895
Workshops are full day sessions that build upon a basic foundation by providing more depth on the topics covered as well as “how to” instructions, templates, typical end-user requirements data, vendor/market assessments and exercises to increase the attendee’s ability to apply this knowledge within an organization. Note we may add additional workshops and you can transfer your credit to another session.
Becoming a Digital Enterprise using Transformative Strategies (Morning)
There is much confusion about what “digital transformation” really means. Most organizations don’t have a clear or consistent picture of what it means to their business. That’s because there is a lack of consensus among business leaders and digital stakeholders. As a business strategy there needs to be a shift in thinking about digital – from one of IT command and control to one where digital choices are focused on business outcomes.
We’re offering a half-day preconference session where we’ll describe ways to get started on transforming to a Digital Enterprise. This level-setting session is designed to foster consensus among business leaders and digital stakeholders to transform through digital strategies. We use recognizable patterns and approaches, that promote agility, integration, flexibility, security, innovation, effectiveness and efficiency. We’ll further describe the framework we designed to help you build a risk-aware and transformative digital strategy that fits your business, its culture, and practices.
Decentralized, Self-Sovereign Identity Services (Afternoon)
This is a half-day pre-conference tutorial designed to provide you with an understanding of a new identity and access management model that builds on blockchain, verifiable claims and user-centric identity principles. We’ll describe the technology behind this approach, early use cases, vendor and industry offerings, emerging standards, the business case, integration and migration planning issues and timing. This will be a valuable foundation to help enterprise architects, security/IT professionals, innovation leaders and line of business executives define an identity strategy in an increasingly decentralized world.
Zero Trust - Security for a New World (Afternoon)
The Zero Trust model of information security basically upends the “castle-and-moat” mentality that had organizations focused on defending their perimeters while assuming everything already inside didn’t pose a threat and therefore was cleared for access.
The castle-and-moat approach isn’t working. In fact, the most egregious data breaches happened because hackers, once they gained access inside corporate firewalls, were able move through internal systems without much resistance.
Zero Trust Networking focuses on locking down all aspects of communication, inside and outside of traditional firewalls. This pre-conference tutorial will help you to understand what ZTN is, how it works, how it benefits the enterprise and some practical advice as to architecting and building a zero trust foundation.
If you want to stop breaches, zero trust is the best way to go.
Identity and Access Management Workshop
Identity and access management (IAM) is the set of business processes—and the supporting infrastructure service components—that create, maintain, and use digital identities within legal and policy contexts. The IAM infrastructure should be pervasive throughout the organization, supporting both centralized and decentralized administration. Embracing the notion of ‘identity is the new perimeter,’ Zero Trust environments recognize that the most critical facet of security is knowing who (or what) the end users are and what they can do.
Unfortunately, an IAM infrastructure does not really come pre-assembled from a single vendor. Instead, system architects are forced to build the infrastructure using best-of-breed directory, access management, provisioning, and workflow systems. Selecting the “right” mix of standards, protocols, open source solutions, vendors and products is no small task, especially if your organization is adopting “cloud first” and zero trust strategies. System architects must build a system that will yield as seamless an implementation as possible while meeting the needs of internal and external user communities, whether on-premise, in the cloud or both.
Our one-day Chrysalis IAM Workshop will help your organization develop a more secure and flexible identity & access management solution and achieve key objectives associated with improved risk management, automation, auditability and cost effectiveness.
Technical Evolution: Monolith to Microservices
Microservice architecture is a hot, popular, and emerging architectural approach that promises to help teams overcome traditional application delivery challenges so they can ‘Be Like Netflix’ and rapidly deliver innovative business functions at scale.
Teams refactoring applications into containers, rebuilding applications to follow Cloud-Native patterns, or modernizing and rationalizing their application portfolio should consider adopting a microservices approach.
In this full-day workshop, Patrick McClory and Chris Haddad will walk participants through the process of evolving large scale systems into microservices architectures and includes many real-world examples and exercises.