Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Swimlane Good (SecOps) Defense is Having a Good Offense

Every security organization, team, and individual is trying to get ahead of everything on their plate but seldom do we have the time to do everything we need to get to everything. Many teams have immense backlogs of processes, activities, and programs that, given enough manpower, would help reduce the risk to their organization. In […]


Doing Security Incident Response in Your Sleep with Swimlane

As we all know, security operations is an around-the-clock job, but building automation response systems is a way to drastically reduce the impact of a potential breach, as well as human error and much of the fatigue that teams are plagued with daily. In this section, we will show you how to measure your readiness […]


Building a SecOps Automation Foundation with Swimlane

The SecOps Automation Maturity Model is a framework for helping organizations better understand where they are on the security automation maturity spectrum. In this section, we will discuss and demonstrate what both a foundational and enriched SecOps automation state should look like and how to better measure and prepare your team for an automation journey.


HashiCorp Boundary Deep Dive

HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. In this presentation, Rob Barnes will demo how HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don’t require managing credentials or exposing […]


HashiCorp Consul Deep Dive

HashiCorp Consul enforces authentication between applications by ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using […]


HashiCorp Vault Deep Dive

HashiCorp Vault provides the foundation for modern multi-cloud security. It was purpose-built in the cloud era to authenticate and access different clouds, systems, and endpoints, and centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest. In this presentation HashiCorp Developer […]


HashiCorp Zero Trust Security Overview

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.


Micron Secure Device Configuration Demo using Triathlon Platform

One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force […]


Micron Device Identities on ICAM – IT Meets OT

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on […]


Micron Authenta Customer Blueprints

Authenta Cloud Platform customers are some of the industry’s most pioneering companies pushing forward the next generation of connected products and services at the edge. This ranges from the data centers lowering operation costs and deploying innovative business models, like Bare-Metal-as-a-Service, to the auto OEMs supporting Mobility-as-a-Service trends. All of these use cases require foundational […]


Micron Silicon Trust in the Subscription Economy

Customers are no longer satisfied with static product ownership as we lean into the subscription economy. The digital transformation is forcing every industry to build products that can evolve, giving them access to dynamic revenue streams, but this introduces new manufacturing and cybersecurity gaps that are hard for most companies to deal with. Micron has […]


How to Use FortiCNP, Fortinet’s Cloud-Native Application Protection Platform, to Help Manage Cloud Risk

FortiCNP is Fortinet’s cloud-native application protection platform (CNAPP) that simplifies cloud security operations through native integrations with Cloud Service Providers’ security services and Fortinet Security Fabric solutions to provide unified and contextualized risk visibility across cloud resources and cloud environments.  FortiCNP provides resource risk prioritization and scalable workflows to help security teams prioritize risk management […]


How to use FortiDeceptor – Fortinet’s Deception Technology, to Help Protect OT and IT Networks

FortiDeceptor, Fortinet’s innovative, non-intrusive, agentless OT/IT/IoT deception solution is a force multiplier to current security defenses, providing early detection and response to active in-network threats. The FortiDeceptor decoys generate high-fidelity, intelligence-based alerts that result in an automated incident response to help stop zero-day attacks. In this session, VP Product Management, FortiDeceptor, Moshe Ben Simon, provides valuable […]


How to use FortiRecon – Fortinet’s Digital Risk Protection service, to Help Detect, Prevent, and Respond to External Threats

FortiRecon provides organization-specific, expert-curated and actionable External Attack Surface (EASM) intelligence, identifies threat actors’ activity and brand infringement, and monitors ransomware data leaks, to proactively help remediate and execute takedowns or purchase the stolen data on an organization’s behalf. In this session, SVP Product Technology & Solutions, Carl Windsor, introduces FortiRecon, Fortinet’ Digital Risk Protection (DRP) service, […]


ZPE Demonstrates Network Automation Blueprint to Recover a Failed FortiGate Upgrade

Rene Neumann demonstrates how ZPE Systems Netbox Network Automation Blueprint can help recover a failed FortiGate firewall upgrade. After introducing the environment for the demo, Rene shows how Netbox can be used as a source of truth to easily keep data current, update Nodegrid details, and update device details using a console connection. He then […]


Expanding the QLC Opportunity with 4th Generation Solidigm QLC SSDs

As data sets grow, the need for more efficient and higher capacity storage is imperative. Learn how Solidigm is planning to address higher capacity, higher performance and greater overall efficiency with the current and future QLC SSDs. Presented by Yuyang Sun, Senior Product Marketing Manager for QLC Products at Solidigm, this presentation discusses the evolution […]


Solidigm QLC SSD Customer Value Stories​

QLC NAND SSDs are being adopted in both cloud and enterprise across a range of workloads. This presentation by Charles Anyimi of Solidigm provides an in-depth overview of how customers are addressing significant storage challenges through the implementation of QLC SSDs. By presenting multiple case studies, Anyimi illustrates the operational efficiencies and cost savings that […]


Solidigm Introduction and Perspectives on Top Storage Challenges

Solidigm’s perspective on storage is unique in the enterprise IT industry. The presentation led by Roger Corell, the Director of Datacenter Messaging and Content, delves into how Solidigm was founded following SK Hynix’s acquisition of Intel’s NAND SSD business and highlights the company as a new paradigm in solid-state storage. Corell emphasizes Solidigm’s distinctive technological […]


HashiCorp Presents at Security Field Day 8


Anytime Storage Upgrades with Pure1

Pure customers love upgrading their storage. When you offer white glove service it’s easy to see why. Now, we’re offering even more flexibility with self-service upgrades so you can perform the same safe and simple upgrades whenever it’s convenient for you with Pure1. Join us as we walk you through the all new self-service upgrade […]


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Aug 19-Aug 20 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Qumulo – Any Data on Any Platform
  • SSD Innovation for AI from Solidigm
  • Cloud ERP on Your Terms: SAP, HPE GreenLake, and the Private Cloud Middle Ground
  • Scality RING – From Microseconds to Magnetic Reels
  • Osmium Update – 9-May-25 – Some Tech Field Day AIIFD2 Highlights!

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in