Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Kemp Field Day Wrap-Up with Jason Dover

In this wrap up session, Kemp discusses the key takeaways from their presentation and how to test this approach in your environment with a free network assessment.

Kemp Demo Ransomware Detection & Response

A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.

Kemp Demo User Account Compromise

In-depth walkthrough of the system capabilities on a single use case. Detection of a user account compromise and event evidence ranging from aggregated network telemetry through signature-based detection and full packet data with built-in out-of-the-box packet analysis.

Kemp Flowmon Technical Architecture

Kemp’s Flowmon network detection & response architecture, components, input data, detection techniques, algorithms and alignment with MITRE ATT&CK framework. Response to threats and further integration to cyber security technology stack.

Kemp Principals & Approaches for Network Threat Detection

Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network.

Kemp Company Overview with Jason Dover

Kemp powers the always-on application experience that enterprises and service providers need to succeed. Kemp has redefined load balancing and network visibility simplified deployment options, flexible licensing, and top-rated technical support. Kemp has more than 100,000 deployments in 138 countries. Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by […]

Juniper Threat Labs with Mounir Hahad

What good is threat research unless you can actually do something with it? Juniper Threat Labs does the research, experiments with new detection techniques, and puts all that knowledge back into Juniper’s security products and services.

Juniper Networks Security Director Insights

If the network plays a key role in security, then network telemetry plays a key role in attack analytics and orchestration. Security Director Insights correlates threat detections and network anomalies and maps them to MITRE.

Juniper Networks Workload Protection with K2 Cybersecurity and vSRX

Your applications are 100% part of the network, even if you don’t own the cloud they’re in. Juniper vSRX natively integrates with K2 Cyber to secure the workload and deliver attack intelligence to the next-gen firewall to keep your defenses ironclad.

Juniper Networks Risk Profiling with ATP Cloud and Mist AI

Risk Profiling integrates the threat intelligence of ATP Cloud with Mist Wired & Wireless access points and AI technology. Every connecting device is a potential risk to the network, and Risk Profiling surfaces that risk so you can decide how to best handle it.

Juniper Networks Adaptive Threat Profiling with ATP Cloud

ATP Cloud is the threat intelligence hub for the network and through Adaptive Threat Profiling mobilizes the entire fleet of firewalls when a targeted attack is detected. Lovingly referred to as the “no-fly list” for your network.

Juniper Connected Security Overview with Kate Adam

Networking & security are converging, and Juniper Networks is here for it! Juniper’s Connected Security strategy is all about extending security to all points of connection the network.

DNS Security Roundtable: Emerging Threats and New Responses

Join the Security Field Day delegates and a special guest from EfficientIP with a forward looking discussion about emerging threats that utilize and leverage DNS and how research from EfficientIP is helping to stem the tide of these kinds of attacks.

DNS Security Roundtable: IoT and DNS Security

Join the Security Field Day delegates and a special guest from EfficientIP for a discussion of the rise of Internet of Things (IoT) devices and ways that networking and security administrators can help secure communications and limit the attack surface of these devices with help from DNS.

DNS Security Roundtable: DNS-over-HTTPS Discussion

Join the Security Field Day delegates and a special guest from EfficientIP as they discuss the latest security protocol to attempt to secure DNS, DNS-over-HTTPS. Does it help? Or is it more trouble than it’s worth? In this roundtable discussion, the panel delves into the complexities and implications of DNS-over-HTTPS (DoH) as a security measure […]

Deep Dive into Cisco NCS 500 Series with David Jakl

Access networks are under pressure as they have to handle more traffic, deliver new services, offer a premium customer experience while mitigating ever-increasing security threats. Discover the new NCS 500 Series access platforms and how they can help you handle these challenges with peace of mind.

Cisco Smart Buildings Innovations Presents at Tech Field Day Exclusive at Cisco Live Global 2021

Cisco Intersight Integrations Presents at Tech Field Day Exclusive at Cisco Live Global 2021

Cisco SecureX Innovations Presents at Tech Field Day Exclusive at Cisco Live Global 2021

Cisco AppDynamics Security and Network Integrations Presents at Tech Field Day Exclusive at Cisco Live Global 2021

« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jan 28-Jan 30 — AI Infrastructure Field Day 4
  • Mar 11-Mar 12 — Cloud Field Day 25
  • Mar 23-Mar 24 — Tech Field Day Extra at RSAC 2026
  • Apr 8-Apr 10 — Networking Field Day 40
  • Apr 15-Apr 16 — AI AppDev Field Day 3
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14
  • May 13-May 14 — AI Field Day 8

Latest Coverage

  • From Brownfield Complexity to Automated Fabric at Global Scale
  • Managing Edge AI and Computer Vision at Scale
  • Digitate ignio and the 2025 AIOps Question: Build or Buy?
  • Reimagining AI from a Security Risk into an Asset with Fortinet
  • ResOps: The Convergence of Security and Operations

Tech Field Day News

  • Cutting-Edge AI Networking and Storage Kick Off 2026 at AI Infrastructure Field Day 4
  • Commvault Shift 2025 Live Blog

Return to top of page

Copyright © 2026 · Genesis Framework · WordPress · Log in