3 - 4 OCTOBER 2018 / EXCEL LONDON
Register Now
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

All |  Date:
3rd October
4th October 
All266
  • Wed 3rd Oct 10:00 - 10:40
  • Brought to you by Chris Hadfield Add to Schedule
    Chris Hadfield  |     |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Chris Hadfield Chris Hadfield View Profile
  • Wed 3rd Oct 11:00 - 11:30
  • Hello World: how to be human in the age of the machine Add to Schedule
    Dr Hannah Fry   |   UCL  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 11:00 to 11:30

    Hello World: how to be human in the age of the machine

    Would you trust an algorithm to send someone to jail? Or to diagnose someone with cancer? How about an algorithm that analysed your friendships to calculate if you were reliable enough to take out a loan? These aren’t hypothetical questions about our distant future. We’re already living in the age of the algorithm. A world where machines rule supreme – making the important decisions in healthcare, transport, finance and security. They’re telling us what to watch, where to go even who to send to prison. So how much should we rely on them to know what’s best? And can we trust them over our own judgement? In this talk, we’ll go on a tour of the good, the bad and the downright ugly of the algorithms that surround us. We’ll lift the lid on their inner workings, demonstrate their power, expose their limitations, and examine whether they really are an improvement on the humans they are replacing.

    Speaker

    Photo Speaker Name Profile
    Dr Hannah Fry Dr Hannah Fry View Profile
  • Unbelievable tales of cyber attack Add to Schedule
    Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:00 to 11:30

    Unbelievable tales of cyber attack

    Every day we read headlines of data breaches, hacks, and malware attacks. Often they're identikit newspaper stories where you could easily just change the names of the companies involved and the number of customer records they have had stolen from them.

    But every now and then something extraordinary happens. Like the companies who pretended to be hacked when they hadn't, or the attackers who went to extraordinary lengths to steal millions from their employers.

    In this presentation, computer security veteran Graham Cluley shares some unbelievable tales of cyber attack.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Customer Journey to Cloud Recovery with AWS and Sungard AS Add to Schedule
    Phil Laslett  |   Sungard AS   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 11:00 to 11:30

    Customer Journey to Cloud Recovery with AWS and Sungard AS

    Whether already using public or private cloud for your business applications or relying on-premises solutions, back-up and an effective recovery is vital to ensuring ‘business as usual’ operation if disaster does strike.
    There are many options available when it comes to recovery, but one of the most effective can be a cloud based solution - regardless of whether your business is already in the cloud or not.

    This session will evidence why a strong Disaster Recovery strategy is critical more than ever today, customer with examples of businesses that have made the decision to embrace cloud recovery.

    We’ll look at how they came about their decision, the benefits it has brought them, and lessons learn for improving resiliency in your organisation whatever stage you are in your Cloud Journey.

    We’ll also look at the AWS Cloud Platform and how Sungard AS can offer Managed, SLA backed seamless recovery both on-premise to AWS or for businesses already in AWS or other cloud environments.

    Speaker

    Photo Speaker Name Profile
    Phil Laslett Phil Laslett View Profile
  • Brought to you by Lenovo Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 11:00 to 11:30

  • Brought to you by CloudDNA Add to Schedule
    Al Taylor  |   cloudDNA   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Brought to you by Fuze Add to Schedule

    UC Theatre

    Wed 3rd Oct 11:00 to 11:30

  • Brought to you by Thousand Eyes Add to Schedule

    Intelligent Networks Theatre

    Wed 3rd Oct 11:00 to 11:30

  • Brought to you by NTT Add to Schedule
    Liam Eagle  |   451 Research  |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Liam Eagle Liam Eagle View Profile
  • From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing Add to Schedule
    Matt Jarvis  |   Mesosphere Inc  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 11:00 to 11:30

    From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing

    Data processing paradigms are undergoing a paradigm shift as we move more and more towards real time processing. Emerging software models such as the SMACK stack are at the forefront of this change, focused on a pipeline processing model, but are also introducing new levels of operational complexity in running multiple complex distributed systems such as Spark, Kafka and Cassandra. In this talk, I'll introduce both Apache Mesos and DC/OS as a solution to this growing problem, and describe the benefits are of running these new kinds of systems for emerging cloud native workloads.

    Speaker

    Photo Speaker Name Profile
    Matt Jarvis Matt Jarvis View Profile
  • Brought to you by Redgate Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 11:00 to 11:30

  • Brought to you by LogRythm Add to Schedule

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 11:00 to 11:30

  • Brought to you by Watchguard Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:00 to 11:30

  • A New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Networks Add to Schedule
    Max Heinemeyer  |   Darktrace  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:00 to 11:30

    A New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. This new wave has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

    Speaker

    Photo Speaker Name Profile
    Max Heinemeyer Max Heinemeyer View Profile
  • Brought to you by Varonis Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 11:00 to 11:30

  • How to make blockchain work with GDPR and other regulatory compliance requirements ACCESS PLUS Add to Schedule
    Sreenivas Bandi  |   Finserv Experts  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 11:00 to 11:30

    How to make blockchain work with GDPR and other regulatory compliance requirements

    Blockchain and GDPR both involve the decentralization of data. Implementing blockchain moves data to decentralized nodes, each owned by an independent party, while GDPR decentralizes the control of data, giving individual people control over how their data is used and monetized. But there is a conflict between the two: Blockchain data is immutable by design, while GDPR mandates that people have the right to be forgotten in certain circumstances. So how do you implement blockchain and other DLT solutions when the data to be stored falls under GDPR? Join Sreeni in an exploration of this issue. This session will discuss the current state of this active debate; it will share some of the most actively supported design ideas, and discuss in detail the current thinking of Lloyd’s, the London Market, and various regulators.

    Speaker

    Photo Speaker Name Profile
    Sreenivas Bandi Sreenivas Bandi View Profile
  • Brought to you by Sec-1 Add to Schedule

    Cyber Hack Theatre

    Wed 3rd Oct 11:00 to 11:50

  • Wed 3rd Oct 11:40 - 12:10
  • Brought to you by Rubrik Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Brought to you by Citrix Add to Schedule

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Brought to you by RingCentral Add to Schedule

    UC Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Get Back to the Future with PRTG Add to Schedule
    Martin Hodgson  |   PAESSLER AG - PRTG Network Monitor  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 11:40 to 12:10

    Get Back to the Future with PRTG

    Join the team from PAESSLER for this compelling presentation, showing you how PRTG our unified monitoring platform can be used to monitor all generations of computing.

    Speaker

    Photo Speaker Name Profile
    Martin Hodgson Martin Hodgson View Profile
  • Brought to you by Aerohive Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Brought to you by Puppet Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Revenge of the Nerds. Using Data Science to defeat the cybercriminals Add to Schedule
    John Shaw  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:40 to 12:10

    Revenge of the Nerds. Using Data Science to defeat the cybercriminals

    John Shaw will describe how Sophos’s data scientists are using machine learning, neural networks and other data science techniques to stop new and unknown malicious activity in business networks. He will describe the techniques that are already proving very effective, and where the next breakthroughs are likely to come from.

    Speaker

    Photo Speaker Name Profile
    John Shaw John Shaw View Profile
  • Brought to you by Gemalto Add to Schedule

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Brought to you by Cisco Security Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 11:40 to 12:10

  • Wed 3rd Oct 12:20 - 12:50
  • Brought to you by Malwarebytes Add to Schedule
    Marcin Kleczynski   |   Malwarebytes  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Marcin Kleczynski Marcin Kleczynski View Profile
  • Brought to you by Nasuni Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by Nutanix Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by 8x8 Add to Schedule

    UC Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Troubleshoot no more. Get one step ahead with AI and Machine Learning. Add to Schedule
    Jason Tyler  |   Cisco  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 12:20 to 12:50

    Troubleshoot no more. Get one step ahead with AI and Machine Learning.

    Put your data to work to troubleshoot your wired and wireless networks, so you don’t have to. Discover how DNA Assurance can use real-time and historical data analytics, to learn, adapt, resolve and even detect problems before they happen.

    Speaker

    Photo Speaker Name Profile
    Jason Tyler Jason Tyler View Profile
  • Brought to you by Gamma Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by Red Hat Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by Bulletproof Add to Schedule

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by Bomgar Add to Schedule

    Identity & Access Management Theatre

    Wed 3rd Oct 12:20 to 12:50

  • HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Add to Schedule
    Zeki Turedi   |   CrowdStrike   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 12:20 to 12:50

    HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Zeki Turedi Zeki Turedi View Profile
  • Brought to you by StayPrivate Add to Schedule

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Brought to you by F5 Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 12:20 to 12:50

  • How AI is driving financial inclusion around the world ACCESS PLUS Add to Schedule
    Areiel Wolanow   |   Finserv Experts  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 12:20 to 12:50

    How AI is driving financial inclusion around the world

    In both developing and mature economies, successful small businesses are the single biggest vector of job growth. As a result, figuring out ways to grant the smallest business access to growth capital often has disproportionately large benefits to the economy as a whole. This talk will illustrate how AI is transforming financial inclusion around the globe. Using an evidence-based approach, we will focus on delivered results, critical success factors, and emerging patterns of solution design.

    Speaker

    Photo Speaker Name Profile
    Areiel Wolanow Areiel Wolanow View Profile
  • Brought to you by Redsift ACCESS PLUS Add to Schedule

    Access Plus: IoT Theatre

    Wed 3rd Oct 12:20 to 12:50

  • The energy consumption of digital infrastructures ACCESS PLUS Add to Schedule
    Dr Umaima Haider  |   Enterprise Computing Research Lab, University of East London  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 12:20 to 12:50

    The energy consumption of digital infrastructures

    Many technologies are evolving to solve internet scale problems such as decentralisation. Blockchain is one such technology with various applications in cryptocurrencies, Ledgers, etc. However, little attention is being paid to the environmental impact of such technologies. This talk will highlight the impact of such technologies on the overall energy consumption of ICT worldwide, and will discuss some of the opportunities.

    Speaker

    Photo Speaker Name Profile
    Dr Umaima Haider Dr Umaima Haider View Profile
  • Secure ENd-Point Management in a Software-Defined World ! Add to Schedule
    Doug Brown  |   IGEL Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 12:20 to 13:05

    Secure ENd-Point Management in a Software-Defined World !

    Secure End-Point Management in a Software-Defined World!
    In this session, IGEL’s Douglas Brown will discuss the state of end-user computing and how a software-defined approach to end-point management positions IT for the future, plus much more.
    In this session, you will learn:
    VDI / SBC in the Enterprise Today
    VDI is today, DaaS is tomorrow. Solutions like AWS, Azure, Google are effecting the requirement and rules of the end-point.
    What Software-Defined means to EUC, End-points and End-point management.
    IGELs solutions to help solve the changing world (UD Pocket, IGEL OS, ICG, and UMS).
    The Future of IGEL and how that maps to the future of the Enterprise.
    This will be a very lively session, come one and come all to learn, have a few laughs, and walk away with one foot in to the future of EUC and IT!

    Speaker

    Photo Speaker Name Profile
    Doug Brown Doug Brown View Profile
  • PANEL: IP EXPO Bytesize Add to Schedule
    Joe Baguley  |   VMware  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 12:20 to 13:10

    Speaker

    Photo Speaker Name Profile
    Joe Baguley Joe Baguley View Profile
  • Brought to you by Amazon Web Services Add to Schedule
    Ric Harvey   |   Amazon Web Services   |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 12:20 to 13:10

    Speaker

    Photo Speaker Name Profile
    Ric Harvey Ric Harvey View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • Brought to you by Cohesity Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Datto Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Navisite Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Duo Security Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Scott Helme Add to Schedule

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Kaspersky Add to Schedule

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Brought to you by Thycotic Add to Schedule

    Identity & Access Management Theatre

    Wed 3rd Oct 13:00 to 13:30

  • Wed 3rd Oct 13:40 - 14:10
  • It’s the End of the World and I Feel Fine – Artificial Intelligence, Apocalypticism, and Human Identity Add to Schedule
    Dr Beth Singler   |   University of Cambridge  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 13:40 to 14:10

    It’s the End of the World and I Feel Fine – Artificial Intelligence, Apocalypticism, and Human Identity

    Anthropologist Dr Beth Singler will introduce some of the key narratives round artificial intelligence that are affecting the public conception of the technology and its development. She will address the impact of science fiction as well as science fact on hopes and fears for humanity’s future in a world of ‘nearly human’ machines. Drawing on anthropological fieldwork at tech conferences, transhumanist gatherings, among the existential risk eco-system, and among online communities, she will explore how public perception on Artificial Intelligence is shaped and what those shapings might mean for the future of this technology.

    Speaker

    Photo Speaker Name Profile
    Dr Beth Singler Dr Beth Singler View Profile
  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense Add to Schedule
    Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:40 to 14:10

    Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Brought to you by Navisite Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Altaro Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Spitfire Add to Schedule

    UC Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Cisco Meraki Add to Schedule

    Intelligent Networks Theatre

    Wed 3rd Oct 13:40 to 14:10

  • UEM – A Tolkien Analysis Add to Schedule
    Sean Herbert  |   baramundi software AG   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 13:40 to 14:10

    UEM – A Tolkien Analysis

    A unique look at how Unified Endpoint Management can help you to take back control of your IT environment. Walk with baramundi down the rocky road to Mordor and discover why one ring may have been an issue, but one tool can still rule them all in this Lord of the Rings inspired presentation!

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Brought to you by Nutanix Add to Schedule

    Full Stack Developer Theatre

    Wed 3rd Oct 13:40 to 14:10

  • The Real T&C’s – Transformation and Culture Add to Schedule
    Paul Fletcher  |   Sainsbury's Supermarkets Ltd.  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 13:40 to 14:10

    The Real T&C’s – Transformation and Culture

    People, processes and technology: the three key pillars of a successful any transformation.

    While technology underpins an organisation’s ability to drive any transformation, it is important to examine your technology deployment alongside the people piece of the puzzle. Understanding what you are trying to achieve with your initiatives, forming teams around this focus, and then implementing new technology enables a cultural shift that allows any transformation to thrive. Whether it is scrutinising your application stack, evaluating collaboration tools, or assessing how and where to deploy mobile devices, it is important to gain an authentic understanding of your needs and implement strategies to successfully socialise technological change.

    Speaker

    Photo Speaker Name Profile
    Paul Fletcher Paul Fletcher View Profile
  • Brought to you by Osirium Add to Schedule

    Identity & Access Management Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Malwarebytes Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:40 to 14:10

  • AI and Cyber Security: What does and does not work Add to Schedule
    Jamie Graves  |   ZoneFox   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:40 to 14:10

    AI and Cyber Security: What does and does not work

    With the rise of automation and artificial intelligence, you may be wondering how much of an impact this has on IT security. The question is, where will the future of machine learning and AI in cybersecurity take us and what are the limitations and advantages this technology offers in defending against the insider threat?

    Join us to find out more about AI and where you should be applying it right now.

    Learning outcomes:
    The current state of AI practice and research, and how this is impacting its use in cyber security
    What the current strengths and weaknesses are with existing AI approaches
    What next generation AI will deliver for us with regards to ensuring we can promptly detect and respond to security incidents

    Speaker

    Photo Speaker Name Profile
    Jamie Graves Jamie Graves View Profile
  • Brought to you by Flexera Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Splunk ACCESS PLUS Add to Schedule

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Brought to you by Citrix ACCESS PLUS Add to Schedule

    Access Plus: IoT Theatre

    Wed 3rd Oct 13:40 to 14:10

  • Wed 3rd Oct 14:00 - 14:50
  • Brought to you by AppCheck Add to Schedule

    Cyber Hack Theatre

    Wed 3rd Oct 14:00 to 14:50

  • Wed 3rd Oct 14:20 - 14:50
  • A day in the life of the UK’s biggest digital transformation Add to Schedule
    Mayank Prakash  |   Department for Work and Pensions (DWP)  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 14:20 to 14:50

    A day in the life of the UK’s biggest digital transformation

    At DWP Digital we’re reimagining outcomes for over 22 million citizens; the scale and social purpose of this challenge is what sets us apart.

    In this session, find out more about the critical ingredients required to drive digital transformation at pace; from embedding a digital mind set to empowering multi-disciplinary teams, whilst continuing to invest in an innovation eco-system. We also look at the challenges that huge scale transformation can bring.

    Speaker

    Photo Speaker Name Profile
    Mayank Prakash Mayank Prakash View Profile
  • The Security-Defined Network Add to Schedule
    Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 14:20 to 14:50

    The Security-Defined Network

    Enterprises are increasingly embracing Cloud-First initiatives and moving their applications to the Internet in public cloud and SaaS environments such as Amazon, Microsoft Office 365 or Salesforce. As the attack landscape becomes ever-more sophisticated, IT teams are adopting micro-segmented network security architectures and proactively shifting their mindsets to verifying everything inside and outside of their networks before granting access (“Zero-Trust” model).

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • An Introduction To Hyper-Converged Infrastructure Add to Schedule
    Tony Stimson  |   Pivot3   |   Storage, Hyperconvergence & Backup

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 14:20 to 14:50

    An Introduction To Hyper-Converged Infrastructure

    This session provides an introduction to Hyper-Converged Infrastructure in simple terms. It covers modern day datacentre challenges and how innovators evolve using hyper-converged infrastructure to meet business demands. Attendees will gain an understanding of use case workloads and how Hyper-converged technology delivers performance, agility and resiliency. The session will also cover specific features and how these translate to tangible business benefits using real-life case studies.

    Speaker

    Photo Speaker Name Profile
    Tony Stimson Tony Stimson View Profile
  • Brought to you by Citrix Add to Schedule

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 14:20 to 14:50

  • How to embrace continual change in your IT infrastructure. Add to Schedule
    Neil Trevains  |   Cisco   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 14:20 to 14:50

    How to embrace continual change in your IT infrastructure.

    The days of ‘big-bang’ changes in IT infrastructure are over. Operating in the digital world means you must embrace what McKinsey has dubbed ‘Perpetual Evolution’ with an approach that supports continual changes in your business processes and IT. Find out how to baseline your organisation’s current state, monitor the dynamic changes taking place, and assess their success with a platform that constantly learns, adapts and protects. From analytics, cloud-based management and containers, to microsegmentation and the zero-trust model, Cisco’s resident Solutions Architect Neil Trevains will give you insights from A to Z in Data Centre engineering for a multicloud world.

    Speaker

    Photo Speaker Name Profile
    Neil Trevains Neil Trevains View Profile
  • Brought to you by Spirent Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by Splunk Add to Schedule

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by Gospel Technology Add to Schedule

    Identity & Access Management Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by Mimecast Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by Sophos Add to Schedule

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by Alert Logic Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 14:20 to 14:50

  • The Convergence of Data Science and Software Development ACCESS PLUS Add to Schedule
    Margriet Groenendijk  |   IBM Watson  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 14:20 to 14:50

    The Convergence of Data Science and Software Development

    In order to move past the hype and achieve the full potential of machine learning, data scientists and software developers need to work more closely together towards their common goal of delivering well-architected, data-driven applications. Every industry is in the process of being transformed by software and data. It is in the collaboration between data scientists and software developers where the real value can be found by creating integrated data workflows that benefit from the unique knowledge and skill sets of each discipline.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • Brought to you by VMware ACCESS PLUS Add to Schedule

    Access Plus: IoT Theatre

    Wed 3rd Oct 14:20 to 14:50

  • Brought to you by DPI Partners ACCESS PLUS Add to Schedule
    Peter Chadha  |   DPI Partners Limited  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 14:20 to 14:50

    Speaker

    Speaker Name Profile
    Peter Chadha View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • We take security seriously Add to Schedule
    Javvad Malik   |   AlienVault  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:00 to 15:30

    We take security seriously

    "We take security seriously" four words that are so easy to say, but what does it mean in the real world?
    Are they just soothing words designed to pacify frustrated users in the aftermath of a breach? Or can these words mean something more?
    I spent months speaking to CISOs, security professionals and practitioners, as well as going undercover to speak to business owners which certainly rattled some cages.
    Thankfully, I dodged many bullets, all in the name of attempting to quantify the unquantifiable - what does it really mean to take security seriously?
    So, come along, find out what the professionals think, what the general landscape is, what steps businesses can take, and maybe a few hard-to-believe side stories.

    Speaker

    Photo Speaker Name Profile
    Javvad Malik Javvad Malik View Profile
  • Brought to you by Citrix Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by Riello Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Unifying Communications with Microsoft Teams Add to Schedule
    Jeff Schertz   |   Polycom  |   UC

    UC Theatre

    Wed 3rd Oct 15:00 to 15:30

    Unifying Communications with Microsoft Teams

    Learn the latest details on Microsoft's cloud-based intelligent communications platform.  One year after the initial announcement of Microsoft Teams as a successor to Skype for Business Online a variety of communications devices and service offerings are now available.  These solutions help bridge the gap between traditional standards-based devices and the new Microsoft Teams meeting workflow.

    Speaker

    Photo Speaker Name Profile
    Jeff Schertz Jeff Schertz View Profile
  • Brought to you by Avanite Add to Schedule

    Intelligent Networks Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by Logicmonitor Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by OneTrust Add to Schedule

    Identity & Access Management Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by F5 Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by eSentire Add to Schedule

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Brought to you by Bluecat Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 15:00 to 15:30

  • Wed 3rd Oct 15:40 - 16:10
  • Brought to you by Nasuni Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 15:40 to 16:10

  • Brought to you by Arcserve Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Wed 3rd Oct 15:40 to 16:10

  • How to Leverage AI in WiFi Networks Add to Schedule
    Bob Friday  |   Mist  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 15:40 to 16:10

    How to Leverage AI in WiFi Networks

    AI is enabling us to solve statistically complex wireless mobile problems that we couldn’t solve just five years ago. In addition, it makes the promise of self-healing wireless networks finally attainable. The speaker explores how AI is changing WiFi, as well as new approaches to setting, monitoring and enforcing service levels, correlating events for rapid trouble-shooting, dynamically capturing packets and achieving highly accurate indoor location services.

    Speaker

    Photo Speaker Name Profile
    Bob Friday Bob Friday View Profile
  • Brought to you by Efficient IP Add to Schedule

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 15:40 to 16:10

  • Brought to you by Microsoft Add to Schedule
    Marcus Robinson   |   Microsoft  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Marcus Robinson Marcus Robinson View Profile
  • Brought to you by Phoenix Datacom Add to Schedule

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:40 to 16:10

  • PANEL: IP EXPO HOT TOPIC: AI Add to Schedule
    Panel  |  Keynote Theatre

    Keynote Theatre Theatre

    Wed 3rd Oct 15:40 to 16:30

    PANEL: IP EXPO HOT TOPIC: AI

    No longer purely in the realms of science fiction the use of AI has exploded in the past few years, already being used to improve healthcare, enable self-driving cars, and stop security breaches. Undoubtedly the hottest topic in IT right now, AI is redefining how we live, interact and do business – it is set to have a profound impact on our everyday lives.

    Most companies already use AI to some degree, for example it is now commonplace as part of a spam filter. However it is accepted wisdom that in the future AI will become a core part of every company’s technology strategy. Learn what is already possible with AI directly from the companies using or developing this technology and discover what will be possible in the near future.

    Speakers

    Photo Speaker Name Profile
    Charlotte Jee Charlotte Jee View Profile
    Daniel Yin Daniel Yin View Profile
    Dr Beth Singler Dr Beth Singler View Profile
    John Shaw John Shaw View Profile
  • PANEL: Cyber Security - The Year Ahead Add to Schedule

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:40 to 16:30

  • Wed 3rd Oct 16:20 - 16:50
  • Brought to you by Cato Networks Add to Schedule

    Cloud Architecture Theatre

    Wed 3rd Oct 16:20 to 16:50

  • Thu 4th Oct 10:00 - 10:40
  • Brought to you by Andrew Keen Add to Schedule

    Keynote Theatre Theatre

    Thu 4th Oct 10:00 to 10:40

  • Thu 4th Oct 11:00 - 11:30
  • Seeing Through Human Eyes: The Power and Perils of AI Add to Schedule
    Carla Echevarria  |   Google  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 4th Oct 11:00 to 11:30

    Seeing Through Human Eyes: The Power and Perils of AI

    In the age of intelligent machines, the most significant threat comes not from malicious machines, but from their human creators. How might we design AI systems that do not inherit human error and bias? We will discuss the process of developing machine learning systems – data gathering, model training, output generation, and human programming – and the principles of design that we must apply to these processes, in order to create AI systems that are truly beneficial for people.

    Speaker

    Photo Speaker Name Profile
    Carla Echevarria Carla Echevarria View Profile
  • Lessons I learnt about Cybersecurity from my Dad Add to Schedule
    Brian Honan   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Lessons I learnt about Cybersecurity from my Dad

    At its heart many of the issues we face with cybersecurity relate to how users interact with the systems they use. Following a conversation with my father about how unsafe cars were when he was a young boy and how car safety has evolved over the subsequent decades, this talk will use that evolution of car safety to highlight how cybersecurity should evolve.

    Speaker

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
  • Brought to you by NTT Add to Schedule
    Jason Tomlinson  |   NTT Communications   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Jason Tomlinson Jason Tomlinson View Profile
  • Brought to you by Nasuni Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by CloudDNA Add to Schedule
    Al Taylor  |   cloudDNA   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Brought to you by Navisite Add to Schedule

    UC Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by Viavi Add to Schedule

    Intelligent Networks Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by Citrix Add to Schedule

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by redgate Add to Schedule

    Full Stack Developer Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by My1login Add to Schedule

    Identity & Access Management Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by Mimecast Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by F5 Add to Schedule

    Cloud Security Theatre

    Thu 4th Oct 11:00 to 11:30

  • Brought to you by Datatonic ACCESS PLUS Add to Schedule
    Oliver Gindele  |   Datatonic  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Oliver Gindele Oliver Gindele View Profile
  • Using Machine Learning for Real-Time Threat Detection Across OT & IT ACCESS PLUS Add to Schedule
    Andrew Tsonchev  |   Darktrace  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 11:00 to 11:30

    Using Machine Learning for Real-Time Threat Detection Across OT & IT

    In an era where OT and IT are increasingly converging, the threat to critical infrastructure is growing and the need to understand and secure complex networks has become unavoidable. Modern industrial networks are highly complex systems involving the interaction of diverse and bespoke devices – legacy products, proprietary protocols, and custom solutions often work side by side with corporate IT technologies and the new generation of Internet of Things devices. The challenge of providing full coverage of enterprise, industrial and IoT environments has never been greater, meaning innovations using machine learning and AI must be explored.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Brought to you by AppCheck Add to Schedule

    Cyber Hack Theatre

    Thu 4th Oct 11:00 to 11:50

  • Thu 4th Oct 11:40 - 12:10
  • Brought to you by BP Add to Schedule
    Morag Watson   |   BP  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 4th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Morag Watson Morag Watson View Profile
  • Brought to you by Veeam Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 11:40 to 12:10

  • Brought to you by Citrix Add to Schedule

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:40 to 12:10

  • Brought to you by Gamma Add to Schedule

    UC Theatre

    Thu 4th Oct 11:40 to 12:10

  • Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined... Add to Schedule

    Intelligent Networks Theatre

    Thu 4th Oct 11:40 to 12:10

    Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined...

    The modern network is expanding rapidly. It connects multiple branches, mobile users, the cloud, and data centres. Mobility, the Internet of Things (IoT), Bring-Your-Own-Device (BYOD) access, and cloud services are critical for business growth. Yet this complexity is making it difficult to secure a network. Many organisations may not even know where to begin when it’s time to strengthen their network defences. It’s harder to see what’s on the network, and it’s harder to spot a threat. Our Network Visibility and Segmentation solution provides you with fast threat detection, highly secure access, and software-defined segmentation.

  • Brought to you by Aerohive Add to Schedule

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:40 to 12:10

  • Brought to you by Red Hat Add to Schedule

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 11:40 to 12:10

  • Brought to you by Sophos Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:40 to 12:10

  • Thu 4th Oct 12:20 - 12:50
  • Zero Trust & The Flaming Sword of Justice Add to Schedule
    Dave Lewis  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 12:20 to 12:50

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Brought to you by ConnectWise Add to Schedule

    Cloud Architecture Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by Nutanix Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by 8x8 Add to Schedule

    UC Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by NETSCOUT Add to Schedule

    Intelligent Networks Theatre

    Thu 4th Oct 12:20 to 12:50

  • UEM – A Tolkien Analysis Add to Schedule
    Sean Herbert  |   baramundi software AG   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 12:20 to 12:50

    UEM – A Tolkien Analysis

    A unique look at how Unified Endpoint Management can help you to take back control of your IT environment. Walk with baramundi down the rocky road to Mordor and discover why one ring may have been an issue, but one tool can still rule them all in this Lord of the Rings inspired presentation!

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Brought to you by Chef Add to Schedule

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by Citrix Add to Schedule

    Identity & Access Management Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by F5 Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by Sophos Add to Schedule

    Advanced Threat Prevention Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by Cisco Security Add to Schedule

    Cloud Security Theatre

    Thu 4th Oct 12:20 to 12:50

  • Brought to you by Capgemini ACCESS PLUS Add to Schedule

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

  • Smart Buildings and GDPR ACCESS PLUS Add to Schedule
    Sarb Sembhi  |   Virtually Informed  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 12:20 to 12:50

    Smart Buildings and GDPR

    This session will bring together several topics related to Smart Buildings, IoT, Supply chain and GDPR. Anyone responsible for Smart Buildings will have to comply with Data Protection, and not only will they need to comply, but they will need to be able to demonstrate that they comply. Demonstrating compliance with Data Protection in Smart Buildings is a complex process, as it requires compliance in not only selecting vendors who understand security and Data Protection, but also installers, integrators and consultants who also understand their role in compliance. This session will cover the regulatory obligations as well as identify some of the key roles and responsibilities related to Data Protection in Smart Buildings.

    Speaker

    Photo Speaker Name Profile
    Sarb Sembhi Sarb Sembhi View Profile
  • Brought to you by IGEL Add to Schedule
    Doug Brown  |   IGEL Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 12:20 to 13:05

    Speaker

    Photo Speaker Name Profile
    Doug Brown Doug Brown View Profile
  • PANEL: Encryption/Privacy Add to Schedule
    Lisa Forte  |   Red Goat Cyber Security LLP  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 4th Oct 12:20 to 13:10

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Customer Journey to Cloud Recovery with AWS and Sungard AS Add to Schedule
    Phil Laslett  |   Sungard AS   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:00 to 13:30

    Customer Journey to Cloud Recovery with AWS and Sungard AS

    Whether already using public or private cloud for your business applications or relying on-premises solutions, back-up and an effective recovery is vital to ensuring ‘business as usual’ operation if disaster does strike.
    There are many options available when it comes to recovery, but one of the most effective can be a cloud based solution - regardless of whether your business is already in the cloud or not.

    This session will evidence why a strong Disaster Recovery strategy is critical more than ever today, customer with examples of businesses that have made the decision to embrace cloud recovery.

    We’ll look at how they came about their decision, the benefits it has brought them, and lessons learn for improving resiliency in your organisation whatever stage you are in your Cloud Journey.

    We’ll also look at the AWS Cloud Platform and how Sungard AS can offer Managed, SLA backed seamless recovery both on-premise to AWS or for businesses already in AWS or other cloud environments.

    Speaker

    Photo Speaker Name Profile
    Phil Laslett Phil Laslett View Profile
  • Brought to you by Park Place Technologies Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 13:00 to 13:30

  • Can your WAN keep up? Start delivering uncompromised experiences over any connection. Add to Schedule
    Tech Leaders  |  Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 13:00 to 13:30

    Can your WAN keep up? Start delivering uncompromised experiences over any connection.

    More users, more apps, different devices? Discover how you can reduce WAN operational complexity and deliver secure, high-performance experiences over any type of wide-area network connection with SD-WAN.

    Speakers

    Photo Speaker Name Profile
    Anton Inniss Anton Inniss View Profile
    Ben Brophy Ben Brophy View Profile
  • Brought to you by Citrix Add to Schedule

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:00 to 13:30

  • Brought to you by Bluecat Add to Schedule

    Cloud Security Theatre

    Thu 4th Oct 13:00 to 13:30

  • Brought to you by Egress Software Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:00 to 13:30

  • Thu 4th Oct 13:40 - 14:10
  • Real cases of social engineering: hackers, competitors and insiders Add to Schedule
    Lisa Forte  |   Red Goat Cyber Security LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Real cases of social engineering: hackers, competitors and insiders

    Social engineering can range from a simple phishing email to a prolonged campaign to turn one of your employees into a malicious insider. Lisa will share some interesting cases she has worked on involving large organisations that have been attacked through social engineering by both malicious actors and competitors. She will detail how the process works, what to look out for when it comes to insider threats and how cyber organised crime groups are trading in fake social media profiles.

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Secure SDN for Enterprises Add to Schedule
    Margarida Correia  |   Juniper Networks  |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:40 to 14:10

    Secure SDN for Enterprises

    Many Enterprises IT departments want to deploy Hybrid-cloud and Multi-cloud environments to become more agile and achieve increasingly demanding business outcomes.
        
    By distributing workloads across public and private/on-prem clouds and extending network connectivity to existent Data Centers, companies can benefit from the best features of cloud as well as coping with existent vast amount of applications on legacy Data Centers.
        
    However, a key problem in this type of new ecosystem is complying with required network security policies. In this presentation, we show how enterprises network security requirements can be addressed in hybrid and multi-cloud environments. We also consider deployment strategies for SDN security in brownfield scenarios.

    Speaker

    Photo Speaker Name Profile
    Margarida Correia Margarida Correia View Profile
  • Brought to you by Datto Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 13:40 to 14:10

  • Brought to you by Lakeside Software Add to Schedule

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 13:40 to 14:10

  • Brought to you by Ringcentral Add to Schedule

    UC Theatre

    Thu 4th Oct 13:40 to 14:10

  • Brought to you by Efficient IP Add to Schedule

    Intelligent Networks Theatre

    Thu 4th Oct 13:40 to 14:10

  • Brought to you by Avi Networks Add to Schedule

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:40 to 14:10

  • Brought to you by RepKnight Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:40 to 14:10

  • How behavioural science is being successfully employed to encourage sustainable behaviour ACCESS PLUS Add to Schedule
    Yolanda Berry  |   UK Behavioural Economics  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    How behavioural science is being successfully employed to encourage sustainable behaviour

    Every day, we are faced with thousands of decisions. Some of them are trivial, like what to wear or eat, while others are critical, like which medical treatment to undergo or which job to take. But all of them contributed to our overall cognitive load, and the resulting decision fatigue is one of the things that makes it so hard for people to adopt sustainable behaviour. In this talk, Yolanda will explain what we currently understand about how humans make decisions, and how we are applying that understanding to help reduce our impact on the environment. The session will include case studies from the UK and abroad, as well as some guidelines on how people use these same techniques in their own work.

    Speaker

    Photo Speaker Name Profile
    Yolanda Berry Yolanda Berry View Profile
  • Thu 4th Oct 14:20 - 14:50
  • The Security-Defined Network Add to Schedule
    Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 14:20 to 14:50

    The Security-Defined Network

    Enterprises are increasingly embracing Cloud-First initiatives and moving their applications to the Internet in public cloud and SaaS environments such as Amazon, Microsoft Office 365 or Salesforce. As the attack landscape becomes ever-more sophisticated, IT teams are adopting micro-segmented network security architectures and proactively shifting their mindsets to verifying everything inside and outside of their networks before granting access (“Zero-Trust” model).

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Brought to you by Spirent Add to Schedule
    Steve Jarman  |   Spirent Communications  |   Storage, Hyperconvergence & Backup

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    Steve Jarman Steve Jarman View Profile
  • Microsoft Teams, The Future of Collaboration and Telephony in Office 365? Add to Schedule
    Tom Arbuthnot  |   Modality Systems  |   UC

    UC Theatre

    Thu 4th Oct 14:20 to 14:50

    Microsoft Teams, The Future of Collaboration and Telephony in Office 365?

    Over 125,000 enterprises already use Microsoft Teams. Available to 181 markets with global PSTN Telephony and Conferencing, Teams is a chat-centric collaboration tool that brings together all the services in Office 365 to allow business to operate more efficiently and effectively.

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Brought to you by Navisite Add to Schedule

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 14:20 to 14:50

  • Brought to you by OneTrust Add to Schedule

    Cyber Threat Protection Theatre

    Thu 4th Oct 14:20 to 14:50

  • Brought to you by Splunk Add to Schedule

    Advanced Threat Prevention Theatre

    Thu 4th Oct 14:20 to 14:50

  • Brought to you by Cisco Meraki Add to Schedule

    Cloud Security Theatre

    Thu 4th Oct 14:20 to 14:50

  • Thu 4th Oct 15:00 - 15:30
  • Brought to you by Mediatron Add to Schedule

    Storage, Hyperconvergence & Backup Theatre

    Thu 4th Oct 15:00 to 15:30

  • Brought to you by Jscrambler Add to Schedule

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 15:00 to 15:30

  • PANEL: IP EXPO Bytesize - The Year Ahead Add to Schedule

    Keynote Theatre Theatre

    Thu 4th Oct 15:00 to 15:50

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top