The Definitive Guide to an Effective IT Automation Strategy
June 15, 2021 | FREE Admission | Earn (ISC)² CPE Credits
IT leaders are looking toward the future with a mix of inspiration and trepidation as they consider how they can further automate their enterprise technologies and processes and give their businesses a chance to catapult ahead competitively and become more agile. In this Interop event, we’ll explore the options available to IT leaders to better understand not only ways to automate, but also how to intelligently plan the strategy to avoid costly overruns and complexities in implementation. After all, winging it or automating piecemeal processes or departments without a careful and comprehensive plan can ironically lead to business slowdowns and soaring expenses.
IT automation is a broad, all-encompassing effort that involves networking, security, operations, business processes, cloud computing, software development, and so much more, so sifting through all the details and crafting a strategy that’s right for your business involves understanding all the parts and including the right stakeholders. Before embarking on your own IT automation effort, join us and our expert speakers to learn about the latest tools, best practices, and pitfalls to avoid. Registration is coming soon! Sign up for alerts and be the first to know when registration opens.
Keynote | A Cohesive and Concise Approach to IT Automation in the Enterprise
Our expert speaker provides a step-by-step approach for planning and implementing an IT automation strategy using real-world examples that were effective in their own journey. By providing tips on evaluating and budgeting for the right technologies to automate both legacy systems and future upgrades, our keynoter will provide you with concrete examples you can use to craft your own approach. We’ll address automation of network monitoring, security, and software development, and address specific ways to consider automation of some business processes like HR, inventory management, customer service and accounting.
Tools and Strategies for Orchestrating and Automating IT and Security Operations
Today's security operations teams are exploring new frameworks and technologies for connecting and correlating security tools and data. Whether it's Security Orchestration, Automation, and Response (SOAR), Extended Detection and Recovery (XDR), or other technologies and practices, security teams are rethinking and reframing the way they handle defense and incident response. But how will these new directions impact the broader IT organization? In this panel discussion, experts will discuss some of the latest trends in security operations, and their potential impact on IT operations.
Reimagining Workflow When Automating Your Enterprise
As companies are challenged more and more by customers to meet their growing demands for products and services, they have to be able to adjust their operations and processes on the fly. That means not only speeding up the efforts, but also rethinking your current approach to workflow and workflow management. With more companies turning to automation and digital transformation, they’re discovering that their current workflow systems and processes may not align with their future business needs. In this session, our expert speakers will discuss how to reimagine workflow so it fits a more agile environment enabled by automation. We’ll address how to plan for this transformation, how to address it with minimal disruption, and how to set up management and monitoring to optimize outcomes.
Automating DevOps for Accelerating Software Delivery
The DevOps process was created to speed delivery of software by combining the efforts of the development staff with the needs of operations to eliminate redundant work. But it didn’t automatically eliminate all redundancies. By automating much of the DevOps processes, IT leaders are now able to squeeze out even more of the costly and time-consuming efforts to both speed up the business and reduce the impact on the budget. In this session, our expert speakers will discuss how companies can add automation technologies and processes to the DevOps effort without having to disrupt current methodologies or retrain workers. We’ll address the challenges of inserting automation into legacy approaches and offer new ideas for helping your dev teams to handle even more projects.
The Role of AIOps in Adopting a Hybrid and Multi-Cloud Strategy
The rise of AIOps presents the opportunity to unify visibility and management across teams, operations, and technology stacks – a need that is growing commensurately with migration to the cloud. According to Omdia, 35 percent of enterprise workloads are currently executing in a cloud environment, an increase from 20 percent in 2018. While many enterprises now have cloud strategies, migrating to the cloud successfully requires a new approach to operational management. The increased complexity of hybrid and multi-cloud environments can reinforce existing siloes across people, operations and technologies. Therefore, the need for unified visibility and management approach across teams and technology stacks has never been more important. The rise of AIOps has enormous potential to connect contextualized information across siloed teams and technology and, where possible, to automate operations. During this session, we will examine how AIOps can help address key operational management challenges that exist in a hybrid and multi-cloud world.
Network Automation with Open Source, Commercial and Custom Software
Moderator: Brett Lykins, Network to Code
The network automation landscape can often be confusing when evaluating how to use software to solve the problems in your network. There are Open Source, Commercial, and Custom software solutions, and understanding what niches they fill, and how they can interact to solve your problems can often be overwhelming. This panel will dive into some common use cases for each category of software and will talk about how to evaluate these solutions based on their appropriateness for your environment and architecture. We will also talk about ways to bring these disparate tools and categories of tools together into an overall network automation framework.
Business Drivers for Network Automation
Troy Whitney, Network to Code
The benefits of network automation go well beyond the technology itself. A comprehensive network automation framework can help you address a wide range of strategic business challenges. These include rapid response to business requests, boosting reliability and availability of services, reduced maintenance costs, and even increased business innovation. In this session you’ll learn how to associate investments in network automation with these and other business benefits to help you secure funding for new initiatives and document the return on investment with key performance indicators.
Developing a Culture for Network Automation
Moderator: Bryan Culver, Network to Code
For network automation to succeed you need the right code, and the right culture. Network automation, and automation more generally, is not a light switch but a culture: a culture defined by how both business and engineering look for novel solutions to problems, inefficiencies and value gains. Our panelists will explain how they developed a culture for network automation, discuss past-experiences, as well as how to identify and apply best-practices to organizations in all phases of their automation journey. These mindsets and thought models apply to networks of all sizes, entirely virtual, legacy, and small business to enterprise.
We partner with (ISC)² to provide credits for Interop. 1 credit is awarded per one hour of security-themed sessions attended, with a maximum of 8 per day. CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.
It’s simple: enter your (ISC)² member number on the Interop registration profile page. If you have already registered for Interop you can log back in to your profile and add it. Following the event, we'll submit your security-themed session attendance to (ISC)² so the credits can be added directly to your account. All educational opportunities offered by the submitter as eligible for CPE credits shall be of the highest quality, directly related to at least one (1) domain of information security as recognized by (ISC)².