4 - 5 OCTOBER 2017 / EXCEL LONDON

Seminars

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

All294
  • Wed 4th Oct 11:00 - 11:30
  • PRTG Network Monitor, a highly flexible and generic software for monitoring IT infrastructure Add to Schedule Rupert Collier  |   PAESSLER AG  |   Monitoring for Ops

    Monitoring for Ops Theatre

    Wed 4th Oct 11:00 to 11:30

  • Business as Usual in a Digital War Zone Add to Schedule Brad Anderson  |   Microsoft  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 11:00 to 11:30

    Business as Usual in a Digital War Zone

    The increasing sophistication and damage from online threats has escalated in parallel with increasing demands for business productivity, interoperability, and anytime access. The ability to work amidst and within these two exponential trends is this era's single most complex technical challenge. In this presentation Brad Anderson (Corp. VP, Microsoft) will discuss in detail new technology pioneered by Microsoft to protect organizations while allowing them to improve collaboration, data access, and productivity.

    Speaker

    Photo Speaker Name Profile
    Brad Anderson Brad Anderson View Profile
  • The Precision Advantage Add to Schedule Rohit Ghai   |   RSA, a Dell Technologies Business  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 11:00 to 11:30

    The Precision Advantage

    The past year has brought an unprecedented focus on global cybersecurity. Threats previously unimaginable now play out regularly. The risk exposure is escalating as businesses across every industry embrace digital transformation and technologies to avoid disruption. To be successful, security practitioners need a more precise approach to security – a more personal approach.

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 11:00 to 11:30

  • Meeting the Privilege Account Challenge: Security vs Productivity Add to Schedule Scott Walker  |   Bomgar   |   IAM

    IAM Theatre

    Wed 4th Oct 11:00 to 11:30

  • The Enemy Within Add to Schedule Matt Lock  |   Varonis Systems  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 11:00 to 11:30

    The Enemy Within

    How can organisations protect their data from an internal breach whilst providing an open, sharing culture within teams and global departments? How can organisations provide assurance to their customers that personal data is securely managed, controlled and retained appropriately? The growth of data has been unprecedented and the challenges associated with managing this information have become almost impossible without a framework that provides clear visibility of where sensitive data is located, who has access to it, who is touching it and who is potentially stealing this information. The Varonis Data Security Platform offer a clear path to managing these risks.

    Speaker

    Photo Speaker Name Profile
    Matt Lock Matt Lock View Profile
  • Brought to you by Cognosec Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Serverchoice Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Navisite Add to Schedule

    Cloud Architecture Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Nimble Add to Schedule

    Storage and Data Centre Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Citrix Add to Schedule

    Cloud Based Networking Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Fuze Add to Schedule

    UC Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Aerohive Add to Schedule

    Wireless Theatre Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Datto Add to Schedule

    Backup Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by HPE Add to Schedule

    Internet of Things Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Tableau Add to Schedule

    Data Analytics Theatre

    Wed 4th Oct 11:00 to 11:30

  • Using deep learning and domain specific enterprise data to build state-of-the-art Entity Recognition models for your voice and chat AI products Add to Schedule Vijay Ramakrishnan  |   Cisco  |   AI in the Enterprise

    AI in the Enterprise Theatre

    Wed 4th Oct 11:00 to 11:30

    Using deep learning and domain specific enterprise data to build state-of-the-art Entity Recognition models for your voice and chat AI products

    Currently, Named Entity Recognition (NER) tasks use shallow machine learning models like Maximum Entropy Markov Models or Multi-class logistic regression to get good accuracies on Natural Language Processing tasks. More recently, deep neural models, especially recurrent neural networks like Long short-term memory (LSTM) have given state-of-the-art accuracies on NER data. We present a hybrid model that uses gazetteer data with a bi-directional LSTM model to beat current state-of-the-art accuracies, enabling our systems to power IOT type applications which have a high transcription error rate.

    Speaker

    Photo Speaker Name Profile
    Vijay Ramakrishnan Vijay Ramakrishnan View Profile
  • Brought to you by RedGate Add to Schedule

    Continuous Delivery Theatre

    Wed 4th Oct 11:00 to 11:30

  • Brought to you by Contino Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 11:00 to 11:30

  • Wed 4th Oct 11:40 - 12:10
  • Brought to you by Amazon Web Services Add to Schedule Ian Massingham   |   Amazon Web Services  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Ian Massingham Ian Massingham View Profile
  • The Next Revolution Add to Schedule Mikko Hypponen  |   F-Secure  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 11:40 to 12:10

    The Next Revolution

    We've lived our lives in the middle of a revolution: the internet revolution. During our lifetime all computers started talking to each other over the internet. Technology around us is changing faster than ever. We've already become dependent of our digital devices, and this is just the beginning. As connected devices open new opportunities for imagination, they also open up new opportunities for online criminals. Where are we today? Where are we going? And how are we ever going to secure a billion new devices that will be going online over the next decade?

    Speaker

    Photo Speaker Name Profile
    Mikko Hypponen Mikko Hypponen View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 11:40 to 12:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Brought to you by Open DNS Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by Citrix Add to Schedule

    App Virtualisation Theatre

    Wed 4th Oct 11:40 to 12:10

  • Patching - A Death Star Analysis Add to Schedule Sean Herbert  |   baramundi software AG   |   Cloud Based Networking

    Cloud Based Networking Theatre

    Wed 4th Oct 11:40 to 12:10

    Patching - A Death Star Analysis

    Whether it was Wannacry this year or the countless other malware and ransomware attacks over the past few years, the same conclusions are generally made... If you have a vulnerability, remediate it! Sean Herbert, Country Manager UK for baramundi software explores some examples and best practices for your patching processes with some real (and other worldly) examples of where it went wrong.

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Brought to you by Gamma Add to Schedule

    UC Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by Veeam Add to Schedule

    Backup Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by Amazon Web Services Add to Schedule

    Internet of Things Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by HPE Add to Schedule

    Continuous Delivery Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by Puppet Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 11:40 to 12:10

  • Brought to you by Prosperon Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 11:40 to 12:10

  • Wed 4th Oct 12:00 - 12:50
  • Brought to you by Appcheck Add to Schedule

    Cyber Hack Theatre

    Wed 4th Oct 12:00 to 12:50

  • Wed 4th Oct 12:20 - 12:50
  • Brought to you by Fortinet Add to Schedule

    CARM Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by RSA Add to Schedule

    IAM Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Forcepoint Add to Schedule

    Cyber Threat Protection Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Open DNS Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Hypergrid Add to Schedule

    Cloud Architecture Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Spirent Add to Schedule Steve Jarman  |   Spirent Communications  |   Storage and Data Centre

    Storage and Data Centre Theatre

    Wed 4th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Steve Jarman Steve Jarman View Profile
  • Brought to you by Tintri Add to Schedule

    App Virtualisation Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by NTT Add to Schedule

    Cloud Based Networking Theatre

    Wed 4th Oct 12:20 to 12:50

  • Practical Solutions for ensuring voice quality in The Cloud Add to Schedule Andy Duncan  |   Spitfire Network Services   |   UC

    UC Theatre

    Wed 4th Oct 12:20 to 12:50

    Practical Solutions for ensuring voice quality in The Cloud

    The Cloud offers a seemingly ideal environment for delivering voice and unified communication solutions. However a Cloud service is only as good as the connection to it. This session looks at the pitfalls of deploying a PBX in The Cloud or utilising a public Cloud solution and offers practical guidance on how the benefits of Cloud deployment can be realised without risking voice quality.

    Speaker

    Photo Speaker Name Profile
    Andy Duncan Andy Duncan View Profile
  • The Wireless Analytics Edge: leveraging built-in Location Analytics and Bluetooth BLE in Cisco Meraki access points. Add to Schedule Emily Spori  |   Cisco Meraki   |   Wireless Theatre

    Wireless Theatre Theatre

    Wed 4th Oct 12:20 to 12:50

    The Wireless Analytics Edge: leveraging built-in Location Analytics and Bluetooth BLE in Cisco Meraki access points.

    Companies and customers expect robust, pervasive wireless connectivity. To gain a competitive edge, improve efficiency, and distinguish their brands, organizations must now leverage their wireless infrastructure as an intelligent platform for collecting behavioral data that provide actionable insights and drive next-generation services.

    This session will review the built-in analytics that come with every Meraki MR access point, and will highlight ways you can use these data to better drive decision-making and efficiency in your organization. We will highlight some of our APIs, along with our rich developer ecosystem, which can be used for turnkey, next-generation applications and solutions.

    Speaker

    Speaker Name Profile
    Emily Spori View Profile
  • Brought to you by Zerto Add to Schedule

    Backup Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Modern Industry Add to Schedule Michael Karliner   |   RedSift  |   Internet of Things

    Internet of Things Theatre

    Wed 4th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Michael Karliner Michael Karliner View Profile
  • Brought to you by datatonic Add to Schedule

    Data Analytics Theatre

    Wed 4th Oct 12:20 to 12:50

  • Enabling continuous Delivery in Large or multi-speed Enterprises Add to Schedule Eddy Pauwels  |   Clarive  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 4th Oct 12:20 to 12:50

    Enabling continuous Delivery in Large or multi-speed Enterprises

    DevOps still generates a lot of buzz. Many smaller companies or teams (often working agile) in larger enterprises have adopted DevOps principles with mixed success. Our focus will be on larger enterprises. Companies with an IT track record, having legacy as well as new applications, forced to work at different delivery speeds, and often with an application architectural landscape that is highly interconnected. How can they enable DevOps and implement Lean principles within the context of application Delivery? These are only a few of the questions we will address in this session. This is a must attend for any enterprise with multiple platforms to support, multiple development methodologies, multiple delivery tools in use, which are serious about DevOps but struggling to get traction and establishing end-to-end control and visibility into their delivery process.

    Speaker

    Photo Speaker Name Profile
    Eddy Pauwels Eddy Pauwels View Profile
  • Brought to you by Github Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 12:20 to 12:50

  • Brought to you by Netscout Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 12:20 to 12:50

  • PANEL: Future of Cyber Security Add to Schedule Panel  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 12:20 to 13:30

    Speakers

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
    Mikko Hypponen Mikko Hypponen View Profile
    Rik Ferguson Rik Ferguson View Profile
    Wendy Nather Wendy Nather View Profile
  • Wed 4th Oct 13:00 - 13:30
  • Cyber Threat Intelligence: The truth behind threat hunting Add to Schedule Mary Haigh  |   BAE Systems Applied Intelligence   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 13:00 to 13:30

  • Brought to you by TrapX Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 13:00 to 13:30

  • Email Security – growing in threats, quickening in pace Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 13:00 to 13:30

    Email Security – growing in threats, quickening in pace

    1m 22s is the median time-to-click in most phishing expeditions. How do you educate your users? How do you encourage them to pause and THINK before clicking?

    In this session Mimecast shares real-world stories and demonstrates how hackers work, the results of which will alarm you, in addition offer guidance that you can share with your employees. They will also cover what other security vendors are missing – the results will surprise you!

    It’s worth a few minutes of your time, isn’t it?

    Speakers

    Photo Speaker Name Profile
    Bob Adams Bob Adams View Profile
    Julian Martin Julian Martin View Profile
  • Brought to you by Talari Networks Add to Schedule

    Cloud Based Networking Theatre

    Wed 4th Oct 13:00 to 13:30

  • Brought to you by GitHub Add to Schedule

    Continuous Delivery Theatre

    Wed 4th Oct 13:00 to 13:30

  • Brought to you by Nasuni Add to Schedule

    Storage and Data Centre Theatre

    Wed 4th Oct 13:00 to 13:30

  • Brought to you by Splunk Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 13:00 to 13:30

  • Wed 4th Oct 13:40 - 14:10
  • Enterprise computation: the next frontier in AI and Data Science Add to Schedule Conrad Wolfram  |   Wolfram Research  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Conrad Wolfram Conrad Wolfram View Profile
  • Three threats that should be keeping you awake at night Add to Schedule Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 13:40 to 14:10

    Three threats that should be keeping you awake at night

    If you're losing sleep over state-sponsored attackers you're approaching things the wrong way. Yes, intelligence agencies are hacking some firms, but chances are that they're not interested in yours.
    Financially-motivated hacks and frauds are on the rise because it has become so easy for attackers to steal large amounts of money. And there's no need for criminals to know how to write malware to potentially steal millions from your business.

    Graham Cluley describes the ways high street businesses are losing data and allowing fraudsters to steal sometimes vast amounts of money, and what you can do to reduce the chances of your firm being the next victim.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 13:40 to 14:10

  • Don't ask, don't tell - the virtues of privacy by design Add to Schedule Eleanor McHugh  |   Innovative Identity Solutions  |   IAM

    IAM Theatre

    Wed 4th Oct 13:40 to 14:10

    Don't ask, don't tell - the virtues of privacy by design

    After years of personal data breaches and mishandled payment data lawmakers are waking up to the importance of online privacy. To comply with new laws we need to put privacy at the heart of our design processes, but how do we do this when design itself is often seen as the enemy of productivity?

    Speaker

    Photo Speaker Name Profile
    Eleanor McHugh Eleanor McHugh View Profile
  • Brought to you by Malwarebytes Add to Schedule

    Cyber Threat Protection Theatre

    Wed 4th Oct 13:40 to 14:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 13:40 to 14:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Brought to you by Zycko Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Nutanix Add to Schedule

    Cloud Architecture Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Tegile Add to Schedule

    Storage and Data Centre Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Zycko Add to Schedule

    App Virtualisation Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Zycko Add to Schedule

    UC Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Gamma Add to Schedule

    Wireless Theatre Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Datto Add to Schedule

    Backup Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by HPE Add to Schedule

    Internet of Things Theatre

    Wed 4th Oct 13:40 to 14:10

  • Brought to you by Splunk Add to Schedule

    Data Analytics Theatre

    Wed 4th Oct 13:40 to 14:10

  • Want to speak with robots like people? Speak with people like robots! Add to Schedule Tech Leaders  |  AI in the Enterprise

    AI in the Enterprise Theatre

    Wed 4th Oct 13:40 to 14:10

    Want to speak with robots like people? Speak with people like robots!

    Natural language processing in legal information offers insights relevant to the entire field. The complexity of legal jargon makes abstracting patterns especially difficult.

    Pre-processing the data well is thus extremely important. One way to improve results is to feed better data to the algorithm. Better data can also come from conscious language choices of the data’s creators: lawyers, judges, academics, and others. The emergence of a data-structure-consciousness in the creation of data by legal professionals would reveal the possibility of a simplified dictionary designed by NLP-specialists that allows for perfect man-machine communication.

    Speakers

    Photo Speaker Name Profile
    Ludwig Bull Ludwig Bull View Profile
    Rebecca Agliolo Rebecca Agliolo View Profile
  • The delivery of a fully automated software delivery pipeline Add to Schedule Michiel Sens  |   Xebia  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 4th Oct 13:40 to 14:10

    The delivery of a fully automated software delivery pipeline

    ABN AMRO, a leading Dutch bank, are working towards Continuous Delivery of new software to further streamline their online services. They asked Xebia to implement the (re)automation of their software delivery process as an end-to-end automated Continuous Delivery Pipeline as a Service (CDaaS). For the implementation, Xebia adopted base principles from the DevOps Agile Skills Association (DASA) with great success. In addition to technological details, Michiel will discuss how to implement a fully automated central delivery pipeline, focusing on topics like starting out as MVP, the importance of functional slicing, building high-performing teams, and automating delivery of the pipeline itself.

    Speaker

    Photo Speaker Name Profile
    Michiel Sens Michiel Sens View Profile
  • Insecure Containers? Continuous Defence Against Open Source Exploits Add to Schedule Andrew Martin  |   Home Office  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 13:40 to 14:10

    Insecure Containers? Continuous Defence Against Open Source Exploits

    Open Source Software underpins the Internet and many enterprises but has proven itself vulnerable, and high-impact exploits lead us to question our unreserved trust. As we fight to continuously secure millions of servers against these waves of attacks, have we found a crucial panacea in containers?

    Speaker

    Photo Speaker Name Profile
    Andrew Martin Andrew Martin View Profile
  • Brought to you by AdRem Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 13:40 to 14:10

  • Wed 4th Oct 14:20 - 14:50
  • Brought to you by Sophos Add to Schedule James Lyne  |   Sophos  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
  • The Future of AI: From Sophisticated to Automated Add to Schedule Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 14:20 to 14:50

  • Next-Gen Application Security Add to Schedule Leigh-Anne Galloway  |   Positive Technologies   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 14:20 to 14:50

    Next-Gen Application Security

    Application security is rapidly moving into top gear. Not only is this caused by ever-evolving attacks aimed at the application layer, but also driven by the constantly growing number and complexity of web applications as a result of digital transformation.
    To stay one step ahead of competitors, companies must deliver value faster, without putting their customers at risk while remaining compliant.
    This takes a fundamental shift in the way application security should be approached: during our session, we’ll share our expert vision of how smart application security strategy should be implemented to protect companies without disrupting their business processes.

    Speaker

    Photo Speaker Name Profile
    Leigh-Anne Galloway Leigh-Anne Galloway View Profile
  • Brought to you by code42 Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by Bluecat Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 14:20 to 14:50

  • How next generation Hyperconverged Infrastructure delivers a priority aware workload approach in the data centre Add to Schedule

    Cloud Architecture Theatre

    Wed 4th Oct 14:20 to 14:50

    How next generation Hyperconverged Infrastructure delivers a priority aware workload approach in the data centre

    With traditional data center infrastructure becoming more expensive and difficult to manage, IT organisations are looking for solutions that enable increased simplicity, agility, and improved economics. Until now, HCI has always been viewed as a single workload platform. With customer case studies based on Pivot3’s new Acuity product, Mike Beevor explains how IT Directors and CIOs can adopt a HCI first strategy to aid in the transformation to the next generation datacenter.

  • Brought to you by Pure Storage Add to Schedule

    Storage and Data Centre Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by iGel Add to Schedule

    App Virtualisation Theatre

    Wed 4th Oct 14:20 to 14:50

  • Protect Your Data from Data Exfiltration Add to Schedule Martin Wellsted  |   EfficientIP  |   Cloud Based Networking

    Cloud Based Networking Theatre

    Wed 4th Oct 14:20 to 14:50

    Protect Your Data from Data Exfiltration

    Our 2017 Security Survey showed that 32% of companies suffered data theft via DNS.
    You may not realize that your current DNS security system leaves the door wide open for hackers to easily exfiltrate your data using 2 techniques: bypassing DNS protocol embedding confidential data within the DNS request or creating a DNS tunnel to take control of workstation and file transfer data outside your network.
    Security solutions like firewalls or proxies are unable to detect data theft.
    What are the best practices to detect and mitigate data exfiltration via DNS to avoid GDPR non-compliance?

    Speaker

    Photo Speaker Name Profile
    Martin Wellsted Martin Wellsted View Profile
  • Brought to you by 8x8 Add to Schedule

    UC Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by Riverbed Add to Schedule

    Wireless Theatre Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by Veeam Add to Schedule

    Backup Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by Citrix Add to Schedule

    Internet of Things Theatre

    Wed 4th Oct 14:20 to 14:50

  • WebXR : Building the Open and Immersive Web Add to Schedule Shaun Davis  |     |   AI in the Enterprise

    AI in the Enterprise Theatre

    Wed 4th Oct 14:20 to 14:50

    WebXR : Building the Open and Immersive Web

    The web as a platform is also shifting to a place beyond the browser. WebVR, WebAR, Chatbots and AI are here. Lets discover how and why they need to remain open and not wrapped up in an app store.

    In this talk, Shaun will take a look at the current state of the immersive web, some of the applications, some of the popular tools and some great live demos.

    Speaker

    Photo Speaker Name Profile
    Shaun Davis Shaun Davis View Profile
  • Industrialising Enterprise Continuous Innovation and Deployment Add to Schedule Mike Silvey  |   Moogsoft   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 4th Oct 14:20 to 14:50

    Industrialising Enterprise Continuous Innovation and Deployment

    No one can hear you scream in the Cloud. Over dramatic perhaps, but migrating continuous innovation and deployment from on premise infrastructure to cloud or serverless compute introduces support vulnerabilities. DevOps staff reacting to issues after their Users and Customers are impacted, often several Developers investigate an issue only to find that the Application is not the cause. Moogsoft uses advanced algorithms to detect Application impacting issues and contextualise causality, whether deploying on premise or Cloud, to transform DevOps from reactive to proactive, industrialising CI/CD and enabling Developers to spend more time on the “Dev”, less time on the “Ops”.

    Speaker

    Photo Speaker Name Profile
    Mike Silvey Mike Silvey View Profile
  • Brought to you by HPE Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 14:20 to 14:50

  • Brought to you by LogicMonitor Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 14:20 to 14:50

  • Wed 4th Oct 15:00 - 15:30
  • GDPR and the work-time paradox Add to Schedule Stewart Room  |   PwC  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 15:00 to 15:30

    GDPR and the work-time paradox

    The GDPR is built on a false assumption of organisational readiness for the new law and data protection confidence and maturity. This false assumption creates a work time paradox, that there has always been too much to do and too little time, therefore legislative compliance failure is inevitable, even in the best run and best resourced organisations. If you're running a GDPR programme, how do you prioritise and know if your choices are good? What's your understanding of GDPR? You need to understand the concepts of adverse scrutiny, and the priorities of people and stakeholders who will want to challenge you.

    Speaker

    Photo Speaker Name Profile
    Stewart Room Stewart Room View Profile
  • How Much Security Do You Really Need? Add to Schedule Wendy Nather  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 15:00 to 15:30

    How Much Security Do You Really Need?

    The answer won't fit in this talk and maybe that's the problem. We know what conventional wisdom has been telling us to do, and we know the current models have drawbacks, ranging from "expense in depth" to "cheeseburger risk management." But there are some shocking answers for us to click on and consider as well. Join us as we take a hatchet to the product portfolio and move Beyond the traditional perimeters and parameters of security.

    Speaker

    Photo Speaker Name Profile
    Wendy Nather Wendy Nather View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 15:00 to 15:30

  • Brought to you by Zycko Add to Schedule

    IAM Theatre

    Wed 4th Oct 15:00 to 15:30

  • What Comes After the VPN? Add to Schedule

    Cyber Threat Protection Theatre

    Wed 4th Oct 15:00 to 15:30

    What Comes After the VPN?

    Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment. In this session you will learn why legacy VPN's are soon to be a thing of the past.

  • The Shift to Self-Learning and Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Brought to you by AlertLogic Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 15:00 to 15:30

  • Data Management for the Hybrid Cloud generation Add to Schedule Filip Verloy  |   Rubrik   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 4th Oct 15:00 to 15:30

    Data Management for the Hybrid Cloud generation

    See how the Rubrik Cloud Data Management Platform allows you to securely manage your data independent of it's location, be it on-premises, remote- and branch offices, or in the Public Cloud. If you seek true freedom from the underlying infrastructure and the ability to move data on-demand to wherever your workloads reside, or If you are tired of legacy backup and recovery solutions and their inability to keep up with modern cloud architectures this session is for you

    Speaker

    Photo Speaker Name Profile
    Filip Verloy Filip Verloy View Profile
  • Brought to you by Eaton Add to Schedule

    Storage and Data Centre Theatre

    Wed 4th Oct 15:00 to 15:30

  • The Self-Driving, Security-Defined Network Add to Schedule Simon Pamplin  |   Silver Peak   |   Cloud Based Networking

    Cloud Based Networking Theatre

    Wed 4th Oct 15:00 to 15:30

    The Self-Driving, Security-Defined Network

    The imbalance between the pace of business change and the stagnation of the WAN has created a bottleneck in securely provisioning a new branch site or application. Based on real customer production deployments, this presentation shares insights on how a centralized SD-WAN platform offers deeper insights into the network. These insights introduce a level of intelligence and automation that uncovers hidden issues such as shadow IT and applies contextual relevance through application awareness. The intelligent grouping of applications allows multi-path and security policies to be dynamically applied at an extremely fine level, completely independent of the underlying transport

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Microsoft Teams, the future of collaboration in Office 365? Add to Schedule Tom Arbuthnot  |   Modality Systems  |   UC

    UC Theatre

    Wed 4th Oct 15:00 to 15:30

    Microsoft Teams, the future of collaboration in Office 365?

    Microsoft Teams was launched in March to 181 markets through Office 365. It’s a chat centric collaboration tool that brings together all the services in Office 365 including Calling, Video, Conferencing and integration with third parties like Trello. It is available to anyone with an Office 365 Enterprise Plan today. Is Microsoft Teams the future of the “Modern Workplace”? How does it work alongside Office 365 and Skype for Business? How can your business make the most of Microsoft Teams? Find out in this session.

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Hyper-Integration: using SDN for WAN, LAN & WLAN Add to Schedule Jan Buis  |   LANCOM Systems GmbH   |   Wireless Theatre

    Wireless Theatre Theatre

    Wed 4th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Jan Buis Jan Buis View Profile
  • Brought to you by Barracuda Add to Schedule

    Backup Theatre

    Wed 4th Oct 15:00 to 15:30

  • Brought to you by Google (Kubernetes) Add to Schedule

    Continuous Delivery Theatre

    Wed 4th Oct 15:00 to 15:30

  • Containers, Kubernetes and Cloud Add to Schedule Mete Atamel  |   Google  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 15:00 to 15:30

    Containers, Kubernetes and Cloud

    Creating a single microservice is a well understood problem. Creating a cluster of load-balanced microservices that are resilient and self-healing is not so easy. Managing that cluster with rollouts and rollbacks, scaling individual services on demand, securely sharing secrets and configuration is even harder. Kubernetes, an open-source container management system, can help. In this talk, we will start with a simple microservice, containerize it using Docker, and scale it to a cluster of resilient microservices managed by Kubernetes. Along the way, we will learn what makes Kubernetes a great system for automating deployment, operations and scaling of containerized applications.

    Speaker

    Photo Speaker Name Profile
    Mete Atamel Mete Atamel View Profile
  • Brought to you by ScienceLogic Add to Schedule

    Monitoring for Ops Theatre

    Wed 4th Oct 15:00 to 15:30

  • The DevOps Superpattern Add to Schedule Helen Beal  |   Ranger4  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 15:00 to 15:30

    The DevOps Superpattern

    DevOps defies definition and for good reason - it’s evolving and maturing all the time. It’s helpful to think of it as a set of best practice principles and goals for improved ways of working together and it’s rapidly become much more than only the preserve of IT development and operations staff and encompasses entire business value streams. There are patterns of thinking that are converging to contribute to the conversation of how we can deliver value better and faster whilst reducing risk and not taking any hits on quality.

    Speaker

    Photo Speaker Name Profile
    Helen Beal Helen Beal View Profile
  • Wed 4th Oct 15:40 - 16:10
  • Brought to you by Garry Kasperov Add to Schedule

    IP EXPO Keynote Theatre

    Wed 4th Oct 15:40 to 16:10

  • How to tell if you are being cyber stalked or hacked Add to Schedule Paul Vlissidis  |   NCC Group  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 15:40 to 16:10

    How to tell if you are being cyber stalked or hacked

    As the cyber lead on Channel 4’s Hunted, Paul and his team hacked over 100 people across two series.
     
    Although the majority of people may think they have some understanding of what good security practices are, attacks are becoming more sophisticated and the prevalence of hackers targeting individuals has increased exponentially in recent years. This session will provide insight into the techniques hackers use, offer tips on how to spot when an attack is in progress, and inform attendees of the online behaviours and techniques that can minimise the threat of such attacks.

    Speaker

    Photo Speaker Name Profile
    Paul Vlissidis Paul Vlissidis View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 15:40 to 16:10

  • Brought to you by Lumeta Add to Schedule

    Cyber Threat Protection Theatre

    Wed 4th Oct 15:40 to 16:10

  • Brought to you by Egress Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 15:40 to 16:10

  • Automating the Network Edge Cases Add to Schedule Rob Waldie  |   Opengear   |   Cloud Based Networking

    Cloud Based Networking Theatre

    Wed 4th Oct 15:40 to 16:10

    Automating the Network Edge Cases

    We're witnessing two big shifts in cloud networking: automation and decentralisation. Cloud networks are pushing infrastructure out towards users at edge locations, to support data delivery, processing and analytics at the scale demanded by digital media, IoT and the digital transformation of business.

    As the networking industry drives towards full intent-based networking, automation is already transforming traditional network operations – with teams adopting the tools and techniques of DevOps and Agile development to abstract, automate and orchestrate infrastructure configuration and provisioning.

    However, at this intersection lies a classic chicken and egg problem: how do you automatically provision a new remote edge network when there's no network over which to automate it?

    Speaker

    Photo Speaker Name Profile
    Rob Waldie Rob Waldie View Profile
  • Brought to you by Docker Add to Schedule

    Continuous Delivery Theatre

    Wed 4th Oct 15:40 to 16:10

  • Wed 4th Oct 16:20 - 17:10
  • PANEL: Future of DevOps Add to Schedule

    IP EXPO Keynote Theatre

    Wed 4th Oct 16:20 to 17:10

  • PANEL: DevOps: What’s now, what’s next? Add to Schedule Steve Thair  |   DevOpsGuys  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 4th Oct 16:20 to 17:20

    Speaker

    Photo Speaker Name Profile
    Steve Thair Steve Thair View Profile
  • Thu 5th Oct 10:00 - 10:40
  • Brought to you by Stuart Russell Add to Schedule Stuart Russell  |   University California, Berkeley  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Stuart Russell Stuart Russell View Profile
  • Thu 5th Oct 11:00 - 11:30
  • Brought to you by IBM Add to Schedule

    IP EXPO Keynote Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by BAE Add to Schedule

    Cyber Security Keynote Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by Watchguard Add to Schedule

    Cyber Threat Protection Theatre

    Thu 5th Oct 11:00 to 11:30

  • Future of Cyber Intelligence: Securing the digital economy Add to Schedule Jon Draper  |   BAE Systems Applied Intelligence   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 11:00 to 11:30

  • Simple, Effective Security with the Cisco Meraki MX Add to Schedule Tony Carmichael  |   Cisco Meraki   |   Cloud Security

    Cloud Security Theatre

    Thu 5th Oct 11:00 to 11:30

    Simple, Effective Security with the Cisco Meraki MX

    The Cisco Meraki MX includes out-of-the-box centralized management capabilities that help administrators secure distributed networks. This session will provide a product update of new and existing security features, and a live demo of capabilities such as NGIPS, Advanced Malware Protection (AMP) with Threat Grid, Layer 7 Firewalling, and more.

    Speaker

    Speaker Name Profile
    Tony Carmichael View Profile
  • Not all SD-WANS are created equal- Why Performance matters Add to Schedule Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 5th Oct 11:00 to 11:30

    Not all SD-WANS are created equal- Why Performance matters

    The data centre is increasingly becoming ruled by software. Software defined storage, software defined networks, virtual machines, and network function virtualization are all changing the way technology is deployed. In this session we will review the software defined landscape, paying close attention to the Software Defined WAN and how it can lower costs, reduce deployment times, and create a more flexible infrastructure. Importantly we will discuss technologies and capabilities covering Performance, Network Visibility, Service chaining and Security that define how you Build a Better WAN.

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Brought to you by Pure Storage Add to Schedule

    Storage and Data Centre Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by Tintri Add to Schedule

    App Virtualisation Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by Citrix Add to Schedule

    Cloud Based Networking Theatre

    Thu 5th Oct 11:00 to 11:30

  • How your Managed Service Provider Can Help Drive Collaboration in Office 365 Add to Schedule Duncan Macdonald  |   Navisite  |   UC

    UC Theatre

    Thu 5th Oct 11:00 to 11:30

    How your Managed Service Provider Can Help Drive Collaboration in Office 365

    Office 365, the fastest growing commercial product ever has the potential to deliver the greatest collaboration and efficiency. We will show you not only where collaboration can help you and your business, but also how a partnering with a Managed Service provider can accelerate these gains.

    Speaker

    Photo Speaker Name Profile
    Duncan Macdonald Duncan Macdonald View Profile
  • Brought to you by Zycko Add to Schedule

    Wireless Theatre Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by Datto Add to Schedule

    Backup Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by HPE Add to Schedule

    Internet of Things Theatre

    Thu 5th Oct 11:00 to 11:30

  • Machines are Learning: Bringing Powerful Artificial Intelligence to All Developers Add to Schedule Danilo Poccia  |   Amazon Web Services  |   AI in the Enterprise

    AI in the Enterprise Theatre

    Thu 5th Oct 11:00 to 11:30

    Machines are Learning: Bringing Powerful Artificial Intelligence to All Developers

    Have you always wanted to add predictive capabilities, image or voice recognition to your application, but haven’t been able to find the time or the right technology to get started? Everybody wants to build smart apps, but only a few are Data Scientists.  This session will help you understand machine learning terminology & challenges, what deep learning is and the possible use cases, how to build a machine learning model that works, and how to use developer-ready APIs for high-quality, high-accuracy AI capabilities that are scalable and cost-effective.

    Speaker

    Photo Speaker Name Profile
    Danilo Poccia Danilo Poccia View Profile
  • Brought to you by HPE Add to Schedule

    DevOps Culture and Transformation Theatre

    Thu 5th Oct 11:00 to 11:30

  • Brought to you by AdRem Add to Schedule

    Monitoring for Ops Theatre

    Thu 5th Oct 11:00 to 11:30

  • Thu 5th Oct 11:40 - 12:10
  • Brought to you by Jenny Radcliffe Add to Schedule Jenny Radcliffe   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Jenny Radcliffe  Jenny Radcliffe View Profile
  • Brought to you by Fortinet Add to Schedule

    CARM Theatre

    Thu 5th Oct 11:40 to 12:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 5th Oct 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Brought to you by RSA Add to Schedule

    Future of Threat Intelligence Theatre

    Thu 5th Oct 11:40 to 12:10

  • Brought to you by Open DNS Add to Schedule

    Cloud Security Theatre

    Thu 5th Oct 11:40 to 12:10

  • Brought to you by Citrix Add to Schedule

    App Virtualisation Theatre

    Thu 5th Oct 11:40 to 12:10

  • Patching - A Death Star Analysis Add to Schedule Sean Herbert  |   baramundi software AG   |   Cloud Based Networking

    Cloud Based Networking Theatre

    Thu 5th Oct 11:40 to 12:10

    Patching - A Death Star Analysis

    Whether it was Wannacry this year or the countless other malware and ransomware attacks over the past few years, the same conclusions are generally made... If you have a vulnerability, remediate it! Sean Herbert, Country Manager UK for baramundi software explores some examples and best practices for your patching processes with some real (and other worldly) examples of where it went wrong.

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Brought to you by Gamma Add to Schedule

    UC Theatre

    Thu 5th Oct 11:40 to 12:10

  • Brought to you by Veeam Add to Schedule

    Backup Theatre

    Thu 5th Oct 11:40 to 12:10

  • New connectivity feature for IoT: API with multi-network SIM cards Add to Schedule Karina Popova  |   LINK Mobility GmbH  |   Internet of Things

    Internet of Things Theatre

    Thu 5th Oct 11:40 to 12:10

    New connectivity feature for IoT: API with multi-network SIM cards

    What would you think if you have the network coverage wherever your sensor are, your own independent cloud based network, extremely scalable and global. Nowadays SIM cards and endpoints can be easily managed in real-time via the intuitive user-interface or an easy-to-integrate API. The rapidly changing social and environmental order is becoming more complex as resources grow scarcer and populations increase, it requires just one technical integration point in IoT, which will provide technological fluency in the use big data for public benefit.

    Speaker

    Photo Speaker Name Profile
    Karina Popova Karina Popova View Profile
  • Brought to you by HPE Add to Schedule

    Continuous Delivery Theatre

    Thu 5th Oct 11:40 to 12:10

  • There is no ‘I’ in ‘TEAM'; Banishing Fear and Sleepless Nights from DevOps Processes Add to Schedule Mike Silvey  |   Moogsoft   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 5th Oct 11:40 to 12:10

    There is no ‘I’ in ‘TEAM'; Banishing Fear and Sleepless Nights from DevOps Processes

    DevOps engineers work in teams to support the end to end process from design to deployment enabling rapid reactivity to issues which impact their applications. However, it’s not always smiles and fist-pumps. Reactions typically happen after end-users are impacted, causality is mostly infrastructure not code-line and, the majority of Pager notifications are noise rather than actionable issues. This impacts Developer quality of life, productivity and performance. Moogsoft will show how advanced algorithms can help detect the actionable issues earlier, contextualise issue causality, notify the appropriate stakeholders, reduce actionable tickets and end-user impact, improve Developer quality of life and, business agility.

    Speaker

    Photo Speaker Name Profile
    Mike Silvey Mike Silvey View Profile
  • Thu 5th Oct 12:00 - 12:50
  • Brought to you by Appcheck Add to Schedule

    Cyber Hack Theatre

    Thu 5th Oct 12:00 to 12:50

  • Thu 5th Oct 12:20 - 12:50
  • It wasn’t me, it was Bennett Arron Add to Schedule Bennett Arron   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 12:20 to 12:50

    It wasn’t me, it was Bennett Arron

    Several years ago, award-winning writer and stand-up comedian Bennett Arron was in serious debt. He owed thousands of pounds to phone companies, banks and department stores. Only it wasn’t him. Bennett had become one of the first major victims of Identity Theft in the UK. This theft resulted in Bennett becoming penniless and homeless.

    Years later, Bennett wrote, directed and presented the Channel 4 Television Documentary How To Steal An Identity. In the programme, which was described as ‘Fascinating and Disturbing’ and was ‘Pick of The Week’ in all the major press, Bennett proved the ease of the crime by stealing the identity of the Home Secretary. He was subsequently arrested by Scotland Yard and shortlisted for a BAFTA!

    Speaker

    Photo Speaker Name Profile
    Bennett Arron Bennett Arron View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 12:20 to 12:50

  • Brought to you by Bitdefender Add to Schedule

    Cyber Threat Protection Theatre

    Thu 5th Oct 12:20 to 12:50

  • Brought to you by Open DNS Add to Schedule

    Future of Threat Intelligence Theatre

    Thu 5th Oct 12:20 to 12:50

  • Brought to you by Zycko Add to Schedule

    Cloud Security Theatre

    Thu 5th Oct 12:20 to 12:50

  • Brought to you by NTT Add to Schedule Len Padilla  |   NTT Communications   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 5th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • The hidden cost of network management Add to Schedule Martin Wellsted  |   EfficientIP  |   Cloud Based Networking

    Cloud Based Networking Theatre

    Thu 5th Oct 12:20 to 12:50

    The hidden cost of network management

    DDI/IPAM are mission critical services
    Consider Hybrid/Cloud/distributed systems
    Clarification of IP distribution shortens project planning and delivery cycles
    Manual and disconnected systems are labour intensive and costly to maintain
    IP addressing, DNS and DHCP require one management interface to deliver efficient and cost effective services

    Speaker

    Photo Speaker Name Profile
    Martin Wellsted Martin Wellsted View Profile
  • Unified Communications In A Multi-Cloud Environment Add to Schedule Sahil Rekhi  |   RingCentral EMEA  |   UC

    UC Theatre

    Thu 5th Oct 12:20 to 12:50

    Unified Communications In A Multi-Cloud Environment

    With the rapid adoption of cloud technology within businesses of all sizes across all industries, new opportunities are opening up to maximize the potential even further in the cloud. In this session, Sahil will discuss the barriers to full cloud adoption and the possibilities around a new generation of open cloud platforms.  Sahil will highlight these trends, along with use case examples and put in perspective where communications is headed in the New Multi-Cloud environment.
     

    Speaker

    Photo Speaker Name Profile
    Sahil Rekhi Sahil Rekhi View Profile
  • Brought to you by Aerohive Add to Schedule

    Wireless Theatre Theatre

    Thu 5th Oct 12:20 to 12:50

  • Brought to you by Zerto Add to Schedule

    Backup Theatre

    Thu 5th Oct 12:20 to 12:50

  • Meeting at the Edge: The Internet of Things is here Add to Schedule Matthias Schorer   |   VMware  |   Internet of Things

    Internet of Things Theatre

    Thu 5th Oct 12:20 to 12:50

    Meeting at the Edge: The Internet of Things is here

    The Internet of Things, what does that actually mean? Is it the smartwatch on our wrist, the smart thermostat in out home or is it much more? When speaking with organisations across sectors, it is often a very different from the general assumption and usually it is much bigger in scope. In this session, Matthias Schorer will set a common ground of what IoT means to VMware and what it means to end user organisations.

    Speaker

    Photo Speaker Name Profile
    Matthias Schorer Matthias Schorer View Profile
  • Brought to you by Chef Add to Schedule

    Continuous Delivery Theatre

    Thu 5th Oct 12:20 to 12:50

  • Legacy Code: Tips for Newbies and Beyond Add to Schedule Hillary Prather  |   TUNE, Inc.   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 5th Oct 12:20 to 12:50

    Legacy Code: Tips for Newbies and Beyond

    Do you cower at the phrase “spaghetti code”? Do you avoid making changes to old, rusty technical systems in fear of them breaking in unexpected ways? Do you find yourself uttering or hearing the words, “just don’t touch it, it’s been working so far…” Technical systems should be adaptable to fit new needs and requirements, but some legacy code systems go untouched for too long, and end up as scary black boxes. During this session, I will talk about what legacy code is, and why it’s important that we as developers take time to truly understand existing systems instead of avoiding them. I will go over strategies that anyone can use to gain valuable insight into even the hairiest legacy code or open source project. We will discuss a variety of tools and helpful visualizations to organize and simplify complex systems. Throughout the session, we will keep in mind how struggling to understand and debug legacy code can make us better, more empathetic developers.

    Speaker

    Photo Speaker Name Profile
    Hillary Prather Hillary Prather View Profile
  • Brought to you by Netscout Add to Schedule

    Monitoring for Ops Theatre

    Thu 5th Oct 12:20 to 12:50

  • The Big Fat IOT Panel of the Year Add to Schedule Cormac Whelan  |   Nokia  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 12:20 to 13:30

    Speaker

    Photo Speaker Name Profile
    Cormac Whelan Cormac Whelan View Profile
  • Thu 5th Oct 13:00 - 13:30
  • Brought to you by Forcepoint Add to Schedule

    Cyber Threat Protection Theatre

    Thu 5th Oct 13:00 to 13:30

  • Brought to you by Splunk Add to Schedule

    Future of Threat Intelligence Theatre

    Thu 5th Oct 13:00 to 13:30

  • Risings costs and regulations complicating email operations? That must be a right pain in the archive! Add to Schedule Julian Martin  |   Mimecast  |   Cloud Security

    Cloud Security Theatre

    Thu 5th Oct 13:00 to 13:30

    Risings costs and regulations complicating email operations? That must be a right pain in the archive!

    What happens when you try to apply 1990’s archiving architecture to 2017 email compliance and usage? You get pain, both on the administration front and from your back-end users. Email volumes are growing so fast that IT and IS departments are constantly updating software, hardware and investments in storage capacity.

    But what about users? Can you easily cut costs AND make data useful again?

    In this session you’ll learn from the leader in the Gartner’s Enterprise Information Archiving Magic Quadrant how to protect your business and enhance user experience, all while reducing the costs associated with email archiving.

    Speaker

    Photo Speaker Name Profile
    Julian Martin Julian Martin View Profile
  • Thu 5th Oct 13:40 - 14:10
  • Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box Add to Schedule Dave Lewis  |   Akamai Technologies  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 13:40 to 14:10

    Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box

    Attackers are always trying their best to breach your network to steal the secret sauce hidden inside. This session will delve into the attacker's tool set and focus on the types of attacks that are being leveraged against companies today. I will examine tools, case studies and my own war stories.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 13:40 to 14:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 13:40 to 14:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Brought to you by Nasuni Add to Schedule

    Cloud Architecture Theatre

    Thu 5th Oct 13:40 to 14:10

  • Brought to you by Zycko Add to Schedule

    App Virtualisation Theatre

    Thu 5th Oct 13:40 to 14:10

  • Practical Solutions for Interconnecting Sites, Data Centres and Cloud Services Add to Schedule Andy Duncan  |   Spitfire Network Services   |   Cloud Based Networking

    Cloud Based Networking Theatre

    Thu 5th Oct 13:40 to 14:10

    Practical Solutions for Interconnecting Sites, Data Centres and Cloud Services

    In order to gain market differentiation, competitive advantage or business efficiency, businesses are increasingly looking to adopt the latest working practices and utilise technological advances.

    The task of implementing solutions to meet these demands falls on IT departments and Service Providers who must ensure not only that the service or application is deployed but that the corporate infrastructure supports the solution effectively.

    This session will offer practical guidance on how the often conflicting demands of cost and service can be met.

    Speaker

    Photo Speaker Name Profile
    Andy Duncan Andy Duncan View Profile
  • Brought to you by Zycko Add to Schedule

    UC Theatre

    Thu 5th Oct 13:40 to 14:10

  • Brought to you by HPE Add to Schedule

    Internet of Things Theatre

    Thu 5th Oct 13:40 to 14:10

  • Brought to you by Skelton Thatcher Consulting Add to Schedule

    Continuous Delivery Theatre

    Thu 5th Oct 13:40 to 14:10

  • DNS In A DevOps World Add to Schedule Carl J. Levine  |   NS1  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 5th Oct 13:40 to 14:10

    DNS In A DevOps World

    DNS is a ubiquitous service that serves as the ingress point for nearly every application and website on the Internet. Despite this, many developers fail to understand the untapped potential of DNS to impact the performance, reliability, and manageability of their applications. DNS has moved beyond static mappings of hostnames to IP addresses, and modern DNS technologies enable real-time reactive and proactive traffic and infrastructure management for the most demanding online properties. In this talk, we’ll objectively discuss how DNS, in concert with DevOps culture and methodologies, is used to solve delivery challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases.

    Speaker

    Photo Speaker Name Profile
    Carl J. Levine Carl J. Levine View Profile
  • Brought to you by Extrahop Add to Schedule

    Monitoring for Ops Theatre

    Thu 5th Oct 13:40 to 14:10

  • Thu 5th Oct 14:20 - 14:50
  • Enemies of the West Add to Schedule Neil Lines  |   Nettitude  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 14:20 to 14:50

    Enemies of the West

    June 2016, the Democratic National Committee was compromised. While there was no proof it is suspected that the Russia hacking group known as APT28 were responsible. History may record this hack as been responsible for losing a US election.
     
    April 2017 the Shadow Brokers released zero day exploits from the NSA hack.
     
    May 2017 WannaCry ransomware, a global attack, affecting governments, medical companies, manufacturing, retail, energy providers and banking was released. Nation state cyber-attacks are regularly documented as highly sophisticated, praying on targets, utilising zero day exploits. This presentation will reveal reality from the myths.

    We are at war and e-mails are now mightier than the sword.
     

    Speaker

    Photo Speaker Name Profile
    Neil Lines Neil Lines View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by My1Login Add to Schedule

    IAM Theatre

    Thu 5th Oct 14:20 to 14:50

  • Cyber Threat Report 2017: Select Global Case Studies from Darktrace Add to Schedule Andrew Tsonchev  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 14:20 to 14:50

    Cyber Threat Report 2017: Select Global Case Studies from Darktrace

    Over the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars. Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, malicious insiders, attacks on cloud environments, and more.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Brought to you by Bluecat Add to Schedule

    Cloud Security Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by Nutanix Add to Schedule

    Cloud Architecture Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by Venus Add to Schedule

    Storage and Data Centre Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by Zycko Add to Schedule

    Cloud Based Networking Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by 8x8 Add to Schedule

    UC Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by Riverbed Add to Schedule

    Wireless Theatre Theatre

    Thu 5th Oct 14:20 to 14:50

  • Brought to you by Veeam Add to Schedule

    Backup Theatre

    Thu 5th Oct 14:20 to 14:50

  • Thu 5th Oct 15:00 - 15:30
  • Brought to you by Irwin Mitchell LLP Add to Schedule Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 15:00 to 15:30

  • The Distributed Enterprise: Remote Access and Management of IT Infrastructure. Add to Schedule Michael Rapley  |   Mediatron Ltd   |   Storage and Data Centre

    Storage and Data Centre Theatre

    Thu 5th Oct 15:00 to 15:30

    The Distributed Enterprise: Remote Access and Management of IT Infrastructure.

    While the proliferation of branch and remote offices is a positive sign of company growth, it can be a challenge for IT personnel. Besides managing data centres, IT teams take on the additional responsibility of managing and repairing branch office assets like routers, switches, firewalls, other serial devices and servers. Employees who work in these remote locations typically do not have the IT skills to troubleshoot problems. To overcome this challenge, many IT professionals use KVM over IP or Serial over IP to diagnose and repair branch office problems.
    This seminar addresses the value (in terms of uptime and security) of out of band access to alleviate remote IT issues.

    Speaker

    Photo Speaker Name Profile
    Michael Rapley Michael Rapley View Profile
  • IP EXPO Keynote Theatre

    Thu 5th Oct 15:00 to 16:10

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top