Washington DC Tech Day

Organizations must find ways to support critical mission accomplishment or strategic business growth and gain competitive advantages. IT can help you improve productivity and collaboration, cut costs, increase ROI and develop new capabilities. It is critical to remain current on market-leading IT solutions that can help you and your organization achieve these goals.

Cisco and partners are hosting a local event to keep you informed of the latest developments in borderless networking, virtualization, and collaboration technologies. Join technical experts for an in-depth discussion of the newest innovations-products, features, and roadmaps so that you can develop strategies and deploy solutions that increase mission accomplishment, resiliency, agility, and productivity.

Tuesday, April 18, 2016
7:30 AM - 3:15 PM ET

Crystal Gateway Marriott
1700 Jefferson Davis Highway
Arlington, VA 22202

Register Now


7:30 - 8:30
Check In and Breakfast
8:30 - 9:30
Session 1
9:30 - 9:45
9:45 – 10:45
Session 2
10:45 - 11:00
11:00 – 12:00
Session 3


12:00 - 13:00
13:00 - 14:00
Session 4
14:00 – 14:15
14:15 – 15:15
Session 5
Please click here for a Detailed Agenda

Data at Mission Speed - Rapid Resource Deployment with ACI

Emerging trends like Social, Mobile, Analytics and Cloud are rapidly shifting the nature of today's mission. To deliver more resources faster, the complexity that typifies most of today's data centers must be reduced and everything from deployment to operations to troubleshooting must be simplified. Application Centric Infrastructure (ACI) provides the means to simplify networking deployment by bringing together people, process and technology to accelerate application deployment. This session will discuss the Nexus portfolio and clarify how ACI simplifies these elements resulting in a faster, more flexible and responsive IT that better aligns with the needs of the rapidly shifting environment of today's Navy.

Cisco's FEDRAMP UC Cloud Solutions

The Federal Risk and Authorization Management Program, or FedRAMPSM, provides standardization on security assessment and authorization. It also offers continuous monitoring for cloud products and services. FedRAMP helps U.S. government agencies cut costs, build confidence in security, and speed adoption of cloud technologies. Cisco offers two core solutions, Cisco WebEx Web Conferencing service and Cisco Hosted Collaboration Solution for Government (HCS for Government). When used together, they provide a complete and secure collaboration solution that was built to meet the stringent requirements of U.S. government-level security. Both are hosted in the Cisco Collaboration Cloud, managed by Cisco and sold by our partners. This session will provide the information that our customers can use to provide industry-leading services including voice, video, messaging, and conferencing from the Cisco cloud with built-in US government-level security so that agencies can collaborate securely with anyone, anywhere on any device.

Secure Wireless for DoD

Come to this session to get comprehensive knowledge of system architecture, product components, and deployment recommendations for your campus or remote branch access network. Attendees at this session will gain a greater understanding of the design and operation of a Cisco Enterprise wireless network, be able to understand how it fits into the broader Cisco Wired and Wireless portfolio from both a product and a design perspective, and recognize the relevant benefits for their own network environments. There will also be an introduction / discussion around the Apple / Cisco partnership and what is being done by both companies to enhance / secure the Enterprise mobility experience from mobile device to software application and EVERYTHING in between. The session will include discussion on CSfC and Location-Based Access.

Cisco Network Visibility and Enforcement

The network provides broad and deep visibility into network traffic flow patterns and rich threat intelligence information that allows more rapid identification of security threats. Cisco uses that visibility to dynamically enforce security policies that are designed to reduce the overall attack surface, contain attacks by preventing the lateral movement of threats across the network, and minimize the time needed to isolate threats when detected. This session will dive into Cisco's ability to see security threats using the existing network, and then providing enforcement.

Securing Data Across the Attack Continuum in a Software Defined Network

Today's Navy networks require security at the speed of the mission. Cisco Application Centric Infrastructure (ACI) provides a comprehensive security solution to help secure next-generation data center and cloud environments. This session reviews the security controls within ACI and how to complement them with range of security products that can provide visibility and protection before, during and after an attack. This session reviews the security controls within ACI and how to complement them with range of security products that can be integrated with ACI. The session also provides security best practices for ACI.

Transitioning the Navy into a Collaborative World

The Navy has been working on transitioning from a legacy TDM environment into more Collaborative Solutions. These solutions are being deployed both in an Enterprise and Local environments. Cisco's Unified Collaboration technology is at the heart of both of these solutions. In this session, we will discuss the overall Enterprise approach for the Navy's shore-based deployments. We will also discuss the solutions that could be and are being deployed on the local RDT&E networks that would allow the bases to meet the DOD objectives of eliminating TDM, but also allow the bases to maintain control over their environment. The discussions will be more architecture based, but will also include products that could be deployed in these environments.

A Practical Approach to Software Defined Networking and Network Virtualization

The goal of this session is to demonstrate Software Defined Networking through Network Functions Virtualization (NFV) and NETCONF/REST interfaces.  Learn how NFV allows the virtualization of network devices such as routers, firewalls and IPS/IDS.  This session also demonstrates how programmatic interfaces defined by data models and optimized for machine-to-machine communications are the key to enabling the network of the future. This session utilizes YANG modelling and NETCONF/REST interfaces to demonstrate network automation through real-world use cases. 

Cisco Threat Centric Access Control Architectures

Today's requirements for access control architectures is a system that contextually regulates who and what is allowed onto the network. Identity Service Engines (ISE) plays a central role in providing network access control for Wired, Wireless and VPN networks. In addition, ISE is the policy control point for TrustSec, which controls access from the network edge to resources. This session will focus on Federal Access Control requirements and how ISE can solve them. Secure policy based access control including 802.1X, MAB, Web Authentication, and certificates/PKI. How Cisco TrustSec can simplify your classification of devices and network ACLs.

Tetration -Real-time Application Visibility & Policy Management Using Advanced Analytics

There is an imminent need within datacenter to understand application behavior, its dependencies and enforcing secure and consistent white-list policy. Tetration offers pervasive visibility into application communication and dependencies. Through a single pane of glass, security policies are automated and enforced based on context and roles. Tetration simplifies operational reliability, zero-trust operations and application migrations to SDN solutions and the cloud.

Collaboration with Apple Mobility Products

Apple and Cisco are creating the very best app and voice experience for iPhone and iPad on corporate networks. With new features in iOS 10 combined with the latest networking software and hardware from Cisco, businesses everywhere can take full advantage of their infrastructure to deliver a great user experience for apps, calling, and collaboration. People using an iPhone or iPad roaming on campus can now be enabled to intelligently communicate and connect to the best-suited access point, quickly and efficiently while saving on battery, too. Also by simplifying deployments for IT, employees get a reliable, consistent app experience, and IT can focus on the business.

Routing Platform Update and Roadmap (45 min)/Switching Update and Roadmap (45 min)

This session will provide an update on the Catalyst Fixed Access Switching portfolio and new software services in IOS XE 16.3. The session will introduce the new products in the Catalyst fixed access switching family. The session will cover new switching innovations for supporting Digital Building, new ways of stacking Catalyst switches, Audio Video Bridging (AVB), Application Visibility and Control (AVC) analytics, how programmability and automation can help reduce operating costs, NBASE-T Multigigabit, and how to protect the network from attacks with integrated end-to-end security using new segmentation capabilities like VxLAN/LISP and MPLS.

Cisco Threat Focused Next Generation Firewall

Cyber attacks are becoming more sophisticated. Organization's need an equally sophisticated way of staying secure. Cisco ASA with FirePOWER Services combines the world’s most deployed firewall with the industry’s most effective next-generation intrusion prevention system (NGIPS) and Advanced Malware Protection. It is the first threat-focused next-generation firewall (NGFW). This session will dive into Cisco's NGFW solutions and designs.

Programmability and Automation on Cisco Data Center Platforms

This session will focus on the different Programmability and Automation tools available on the Nexus Platforms, including PoAP, NX-API, Netconf, Bash access, Python, Linux Containers, etc. Different use cases for these platforms will be discussed, with code samples, execution and best practices shared. Configuration Management tools such as Puppet and Ansible are also covered.

Cisco Unified Collaboration Update 

Working together, people can achieve extraordinary things. Improve collaboration with technology that empowers people to engage and innovate – anywhere, on any device. Cisco’s comprehensive portfolio of products allows DOD users to be able to collaborate like never before. Bringing new cost effective video endpoints to market, delivering new world-class voice enhancements, and an integrated solution that allows customers to scale at “Carrier-Grade” has set Cisco apart from the competition. Add-in intelligent applications, like Jabber and Cisco Webex Meeting Server and you now have a comprehensive solution that is designed to bring customers the seamless experience that they expect. The recent partnership announcement between Cisco and Apple only strengthens the Cisco Unified Communications solution by providing tightly integrated products and new enhancements that will allow Apple products to run better on a Cisco network. This presentation will discuss the various products that make up the Cisco Collaboration Portfolio, design architectures that are “Carrier-Grade”, and how the Apple partnership will change the way that people work, live, play and learn.

Connected Base

The Connected Base is quickly becoming a reality. Connecting base infrastructure, Facilities, Logistics, Security, Transportation, Offices, Classrooms, Flightlines all come together to support the mission and how we work, live, play and learn. Come see how Cisco technology enables the support the overall mission.

Cisco Advanced Threat Architectures

There is no question that the threat landscape has changed. The stimulating force behind these threats have gone from mostly security researchers with intellectual curiosity to patient, funded, and highly motivated individuals with well-defined targets. Viruses, Worms, Spyware, Adware, and the like are all connected pieces of Crimeware infrastructure designed to ensure that breaches are difficult to catch, allow for continuous access, while remaining hidden in plain sight. This session will dive in to Cisco's Advanced Threat Solutions designed to provide both defense and insight Before, During, and After these breach attempts.


Round table discussion with Business Unit, CSEs and SEs on track topics.

Video is Everywhere…Are you Ready?

Organizations are successfully using video to transform business processes, speed decision making, and engage with customers and partners. However, DOD organizations are faced with challenges in trying to realize the vision of pervasive video and conferencing. Integrating and scaling video and conferencing solutions across a wide range of voice, video and web conferencing tools and devices can be complex and costly. Its time for an evolved approach for multiparty conferencing to make video collaboration easy-to-use and scalable, as well as remove barriers to seamless deployments across global communities. Cisco is evolving video and conferencing solutions to be better aligned with the way DOD meets and collaborates. Virtualization has brought an entire new way to deploy video conferencing, and allows seamless integration with existing systems. This presentation will discuss the power of the Cisco TelePresence Pervasive Conferencing Infrastructure and the capabilities that simplify the approach for multiparty conferencing with a common user experience.

Network Compliance and Network and Application Monitoring with Prime Infrastructure 3.0

Configuration Compliance is a feature introduced in Prime Infrastructure 3.0. In this session, we will explain first the concept of this functionality and its components like policies, profiles and jobs. Then we will explain how to use it on examples. These example will cover the use of predefined policies as well as the creation of user defined policies based on configuration and device output. It will also cover device and interface performance monitoring, Application Monitoring , and Fault management. New capabilities introduced with Prime Infrastructure 3.0 , like port classification, port grouping enhancements, flexible fault management will be addressed.

Secure Data Center

This session will outline how security can be propagated throughout the Data Center Management and define how these technologies can work together to build a secure Data Center Management and Cloud strategy for the enterprise. Topics covered will include Current Threats, Security Hardware and Software, Network Segmentation, Cloud Connectivity, Software Defined Networks, Data Center Management Interconnects, Security Architectures and more. This session will provide an overview to anyone interested in how Security can be inserted in their Data Center Management.

Cisco only privacy policy: You are being invited to attend a Cisco-sponsored event. By providing your contact details, a representative may contact you regarding this event. All personal information will be handled in accordance with Cisco Privacy Statement .