Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

ZPE Introduction: Why Cybersecurity for Enterprise Can’t Be Solved By One Vendor

Cybersecurity vendors are at the top of their game. So why are cyberattacks increasing and becoming more effective? We’ll discuss the modern enterprise’s pain of having too many products, from too many vendors, which leaves too many security gaps. We’ll also discuss why this dynamic attack surface can’t be solved simply by adding more products, […]


Effective Threat Containment with Arista Macro-Segmentation

Segmentation is not a new concept and yet, many organizations struggle to be successful at this key security control due to the implementation complexities. Sachin Vador dives into how Arista’s approach provides a standards-based mechanisms for segmentation while avoiding challenges such as TCAM exhaustion and proprietary formats.


Pervasive Visibility to Deliver Zero Trust with Arista DMF

Visibility is foundational to security, but legacy network packet brokers are broken when dealing with enterprise-wide security threats. Prashant Gandhi will describe how Arista DANZ Monitoring Fabric provides pervasive observability via a modern, programmable monitoring fabric, enabling security analysts and tools with access to any packets/flows at any time in addition to traffic insights.


Arista Awake Labs: Real World Incident Response Case Studies

In this session, Kevin Adams-Romano will share a few examples that illustrate the need for network visibility for effective threat hunting and breach response. The network represents ground truth and with the right combination of people, process and technology, it can offer the early warning signs needed to disrupt attacks ranging from ransomware and insider […]


Detecting Modern Threats with Arista NDR

Networks have become more complex and perimeters have vanished. Yet, we are still reliant on decades-old network security platforms as defenses from modern threat actors. Gary Golomb will discuss the challenges with relying on data sources like NetFlow and present recent innovations in the Arista NDR platform that address those challenges.


Arista Introduction and Security Strategy with Rudolph Araujo

Arista provides visibility, detection and response across wired, wireless, and cloud infrastructure. In this introduction, Rudolph Araujo will talk about Arista’s AI-driven approach to enable the customer’s zero trust journey as well as how the company brings decades of experience to bear for customers through threat research, incident response, and threat hunting solutions.


How to Secure your Secrets with Keeper Security

Since IT network secrets unlock access to highly privileged systems and data, securing secrets is just as critical to preventing cyberattacks as securing end-user passwords. One study found that 75% of ransomware attacks involve compromised credentials – most of the time, RDP credentials. However, secrets management is a challenge for IT teams, who must mitigate […]


Microsoft Security Automate Threat Detection and Response with SIEM+XDR

Today’s threat landscape continues to grow in complexity, sophistication and frequency. As advanced attacks emerge, Microsoft is on the frontlines working with customers and partners. We’ll share the latest technology around our integrated SIEM+XDR solution, to protect your environment end-to-end and get ahead of adversaries.


Microsoft Security Azure Active Directory – Zero Trust

Microsoft defines Zero Trust as a proactive, integrated approach to security across all layers of the digital estate that explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to respond to threats. Nitika Gupta, Principal PM Manager, will cover the lessons we’ve learned across thousands of […]


Microsoft Security Overview with Ryan Mcgee

Microsoft Security is committed to empowering every person and every organization on the planet to achieve more by providing comprehensive protection. It brings together the capabilities of security, compliance, identity, endpoint management, and privacy, designed to work in your multicloud and multi-platform environment. Microsoft Security helps defend organizations around the world against the evolving threat […]


Aruba Presents EdgeConnect SD-WAN at Atmosphere 22


Aruba Presents Aruba Central at Atmosphere 22


VAST Data Announces Next Generation Platform Concept Called Ceres

An introduction to a next generation platform concept called Ceres. Enabled by VAST’s Universal Storage data platform, Ceres is built leveraging new hardware technologies including NVIDIA BlueField DPUs (data processing units) and Solidigm ruler-based hyperscale flash drives that improves performance, simplifies serviceability and reduces data center costs. Presented by Jeff Denworth, Co-Founder and CMO.


MinIO Presents at Tech Field Day 25


VMware Presents at Tech Field Day 25


Cisco Secure Application for AppDynamics

Cisco dives into Secure Application, the only solution purpose-built to protect business-critical applications no matter where they run, from the inside out, to maintain speed and uptime, while balancing risk. You’ll learn by leveraging the AppDynamics agent, Secure Application will uniquely bring together business, performance, and security insights to protect your brand against slowdowns and […]


Cisco Cloud Native Application Connectivity and Security Solutions

Businesses are increasingly adopting Cloud Native microservice-based architectures to enable rapid application development with flexibility, stability, portability, and scale. These Cloud Native architectures present new connectivity and security challenges to operators. Learn how Cisco is bringing their extensive experience, expertise, and thought leadership in networking and security to these new architecture domains. In this session, […]


Cisco Secure Cloud Insights, Beyond Just CSPM

This session will dive into identifying, mapping, analyzing, and securing your cyber assets and attack surface with Cisco Secure Cloud Insights. You’ll learn how to gain full visibility into your complex cloud environments to uncover threats, close compliance gaps, and prioritize risk. Cisco dives into how Secure Cloud Insights moves your visibility from just posture […]


Cisco Nexus Dashboard Bolsters Network Visibility with Innovations

Cisco Nexus Dashboard is the solution that IT has been looking for to be able to build, connect and operate hybrid cloud networks rapidly and securely. In this session, you’ll learn more about Cisco’s latest cloud-neutral innovations, tracking end to end flow across service chains real time, how to break down operational silos between network […]


Cisco Endpoint Security Posture Analysis and Trusted Access

Learn how Cisco AI Endpoint Analytics is used to evaluate endpoint security posture by continuously analyzing endpoint attributes and behavior for anomalies, threats, and vulnerabilities. Find out how it uses the evaluation to provide trusted access to endpoints and IOT devices around your enterprise. They discuss two key use cases with demos.


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Aug 19-Aug 20 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7

Latest Coverage

  • Codiac Refreshes Container Management Across SDLC: Some Key Features on the Platform
  • HPE Greenlake Paves a Path to a Hybrid SAP ERP Future
  • Scality Showcases Real-World Resilient Cloud Storage Solutions
  • OpsRamp Shows Unified IT Operations for Fast Incident Management
  • VIAVI: PCAPs and LLMs

Tech Field Day News

  • Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025
  • Exploring Cloud Resilience, AI, and Data at Cloud Field Day 23

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in