Our Blog

NLIT Summit in Boise offers big name keynotes, addresses key trends and practices

Share

Wednesday, May 22, 2019

When you think about Idaho, chances are the first thing that comes to mind is potatoes and not IT operations and technology associated with government-funded laboratories and plants. While you can rest assured that there are still plenty of spuds in the state famous for the crop, later this month Idaho will be known for something else (at least within IT circles) – best practices, strategies and ideas for IT professionals within the DOE complex.

May 28-31, the NLIT Summit 2019 comes to Boise. Forcepoint will be represented at this year’s event, and we are looking forward to four days of education, innovation and opportunities to connect and network with a variety of industry partners. Below are just a few of the topics, sessions and speakers topping our list for NLIT 2019.

Focused Tracks on Timely Topics

This year’s conference features 13 tracks focused on a variety of topics, ranging from cyber security and the cloud to scientific computing. The tracks include:

  • Cloud
  • Infrastructure/Operations
  • Data Analytics
  • Policy and Governance
  • Scientific Computing
  • New Technology
  • User Experience
  • Mobility
  • Networking/Telecommunications
  • Industrial Control Systems/Operational Technology
  • Community Interest (focus groups)
  • Vendor
  • Cyber Security

Staying Ahead of the Curve in Cyber Security

A common thread between the sessions in the cyber security track is an emphasis on proactive planning and strategies to approach planning and preparation differently, and ensure proactive measures are in place and threats are minimized.

Sessions in the cyber security track include:

  • Thinking Differently: A New Approach to Cyber Security Education
  • AWE's extended Information Assurance Lifecycle: The story continues...
  • Designing Security into Software Systems using Threat Modeling
  • NNSA IT in 2035?
  • The Journey to an Effective Vulnerability Management Program
  • End-User Security: A Cornerstone of Defense in Depth Cyber Security Solutions

Keynote Speakers

The NLIT Summit 2019 also includes an impressive lineup of keynote speakers. Among them is Kris “Tanto” Paronto, a former Army Ranger and private security contractor who has deployed throughout South America, Central America, the Middle East and North Africa. Paronto was part of the CIA annex security team that responded to the terrorist attack on the US Special Mission in Benghazi, Libya on September 11, 2012. His story was told in the book “13 Hours,” and he is also the author of “The Ranger Way.”

On Thursday, May 30, Mike Abrashoff – author and former Navy Commander of the USS Benfold – will share how he transformed the near-worst performing ship in the Navy into one of the best, all with the same crew. He will share insights from his experience and practical applications for organizations, leaders and teams.

A true rocket scientist will close out the conference on Friday with his experiences in aeronautics & astronautics. Dr. Randii Wessen is the Lead Study Architect for NASA’s Jet Propulsion Laboratory’s Innovation Foundry’s A-Team. He has performed various roles and held multiple titles during his 35-year career with NASA, including System Engineer in the Astrophysics division, Telecommunications & Mission Systems Manager in the Deep Space Network serving Mars missions, Manager of the Cassini Science Planning & Operations, the Galileo Deputy Sequence Team Chief, and the Voyager Science Sequence Coordinator for the Uranus & Neptune encounters.

Find us in Boise

If you’re planning to attend the NLIT Summit 2019, be sure to visit us in the vendor expo at booth #318. To learn more about the expo and view the floorplan, click here. We look forward to seeing you at the Boise Centre on May 28th!

About the Author

CK

Christina King

Christina King is a highly experienced Federal Account Executive focused on supporting the Department of Energy. She empowers civilian agencies to solve mission critical cybersecurity challenges with a unique human-centric approach as they interact with critical data.