Menu

With so much going on at IP EXPO Europe 2015, the below is a selection of some of IT's most influential people, shaping the technology fit for a digital world.


Here is a list of all confirmed Seminars for our 2015 show. You can add these to your planner by clicking the add button

  • Wed 7th Oct 10:00 - 10:40
  • Wikipedia Founder tackles cyber security Add to Schedule
    Jimmy Wales  |   Wikipedia  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 10:00 to 10:40

    Wikipedia Founder tackles cyber security

    In this insightful speech, Jimmy Wales tackles the topic of cyber security. He addresses the dangers of government snooping, the value of encryption, and the negative impact of cyber security failures on freedom of expression and democracy.

    Speaker

    Photo Speaker Name Profile
    Jimmy Wales Jimmy Wales View Profile
  • Wed 7th Oct 11:00 - 11:30
  • Relax with Macrium Reflect Add to Schedule
    Stephen Macpherson  |   Macrium Software   |   Backup and Recovery

    Backup and Recovery Theatre

    Wed 7th Oct 11:00 to 11:30

    Relax with Macrium Reflect

    For the busy IT Administrator a backup solution that provides peace of mind, speed and reliability should also be easy to manage.  Macrium Reflect is already a highly trusted solution that is fast and reliable for image based backup and DR of Windows systems. Now we are adding a fresh approach to backup management. With the upcoming release of the new Macrium Reflect management framework we are once again taking the strain off the IT Administrator.

    Speaker

    Photo Speaker Name Profile
    Stephen Macpherson Stephen Macpherson View Profile
  • Data protection for SMBs – how to do it right? Add to Schedule

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 11:00 to 11:30

  • Brought to you by IGEL Add to Schedule

    Application Virtualisation Theatre

    Wed 7th Oct 11:00 to 11:30

  • NO DNS, NO INTERNET, NO BUSINESS; Protect Your DNS from Attacks and Secure Your Business Add to Schedule
    Scott Breadmore  |   EfficientIP   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 11:00 to 11:30

    NO DNS, NO INTERNET, NO BUSINESS; Protect Your DNS from Attacks and Secure Your Business

    Five questions to evaluate your level of vulnerability and define your needs in terms of DNS security.

    A 2014 IDC DNS Security survey revealed that, "72% of companies have experienced a DNS attack in the last 12 months”. The question is no longer whether, but when are you going to be attacked? And, when it happens, do you have the right solutions to mitigate them?

    “Traditional security solutions are not the right answer to protect critical DNS infrastructure from attacks” said IDC analyst in the 2014 DNS Security Survey. “This is a real case of the wrong answer to a real problem.”

    Learn five questions to ask yourself to evaluate your level of vulnerability and define your needs in terms of DNS security.

    Speaker

    Photo Speaker Name Profile
    Scott Breadmore Scott Breadmore View Profile
  • How to realise business outcomes from the cloud - balancing choice and control in a multi-cloud world. Add to Schedule
    Neil Lock  |   BT Global Services  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 11:00 to 11:30

    How to realise business outcomes from the cloud - balancing choice and control in a multi-cloud world.

    • Nine out of ten European enterprises have benefited from cloud investments, yet prefer tactical quick wins over high-impact cloud-led business transformation projects. What’s stopping businesses being more aggressive with the cloud?
    • 90% of our biggest customers expect to be using multiple clouds in the next two years. How can complex cloud ecosystems be managed with confidence?
    • 32% of IT decision makers worry they don’t have the skills to manage migration to the cloud or select the right suppliers. What range of skills do organisations need in a multi-cloud environment?
    • 31% of IT decision makers say they could train for a marathon faster than it would take to migrate their companies applications to the cloud. Why is an increased use of hybrid cloud leading organisations to upskill or adapt the mix of IT skills?
    • 66% of organisations cite data and network security as a key challenge for cloud. How can organisations get the right balance between choice and control in the cloud?
    • 90% of organisations are shifting towards end-to-end management for data centres and networks. What does this mean for the future of cloud?

    Speaker

    Speaker Name Profile
    Neil Lock View Profile
  • Why your digital efforts will fail without Application Intelligence Add to Schedule
    John Rakowski   |   AppDynamics   |   Machine Data, Monitoring and Analytics

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 11:00 to 11:30

    Why your digital efforts will fail without Application Intelligence

    There is a new value proposition around performance management with software at the very heart of the business. It’s become the new differentiation. The software-defined business has the ability to offer fast, interactive experiences. But how can the business be measured, like the speed of transactions, the most popular user path or the most visited sections? The sheer amount of data to measure and have meaningful insights into is vast. The right analytics solutions will enable common data – from business transactions involving a specific app, for instance – to be presented to a wide range of executives in ways which suit their different information requirements.

    Speaker

    Photo Speaker Name Profile
    John Rakowski John Rakowski View Profile
  • Brought to you by NTT Add to Schedule

    Unified Communications & Collaboration Theatre

    Wed 7th Oct 11:00 to 11:30

  • The True Meaning and Challenges of Bring Your Own Device (BYOD) in the Modern Workplace Add to Schedule
    Bryan Harkins  |   Aerohive Networks Europe Ltd   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 7th Oct 11:00 to 11:30

    The True Meaning and Challenges of Bring Your Own Device (BYOD) in the Modern Workplace

    Bring Your Own Device was once allowed only on the guest network, to save users money reducing time spent on a mobile plan. Today, users wishing only to reduce data plan costs are treated as pure guests. Users wishing to connect personal devices to the corporate network for business reasons present a new challenge. Administrators are now faced with the choice of allowing this for the sake of productivity at a reduced capital expense or losing the opportunity to improve productivity by following old practices. Network administrators must now truly be prepared to onboard these devices in a secure manner.

    Speaker

    Speaker Name Profile
    Bryan Harkins View Profile
  • Next Generation Data Services Add to Schedule
    Dietrich Benjes  |   Varonis   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Wed 7th Oct 11:00 to 11:30

    Next Generation Data Services

    This seminar will show you how to get more out of your data with less risk and less cost. Human-generated unstructured data, such as spreadsheets, documents, presentations, audio files, video files, emails, text messages and any other data created by employees are like oxygen for our businesses, but so many companies struggle to stay productive, secure, and cost-efficient in the face of exponential data growth.

    Speaker

    Photo Speaker Name Profile
    Dietrich Benjes Dietrich Benjes View Profile
  • Moving from a Data Centre to a Hybrid IT Environment Securely Add to Schedule
    Jeff Green  |   Pulse Secure   |   Enterprise Mobility Management & Security

    Enterprise Mobility Management & Security Theatre

    Wed 7th Oct 11:00 to 11:30

    Moving from a Data Centre to a Hybrid IT Environment Securely

    In today’s world of cloud adoption and SaaS-based applications, the edges of the Data Centre are disappearing. It is becoming increasingly difficult to understand and control who is accessing services and applications. We discuss 10 strategies to help you move securely from a data centre only environment to a hybrid IT model.

    Speaker

    Photo Speaker Name Profile
    Jeff Green Jeff Green View Profile
  • DDoS Attacks and Protection Add to Schedule
    Anthony Chadd   |   Neustar   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 11:00 to 11:30

    DDoS Attacks and Protection

    Industry survey reveals trends in DDoS threats — and how enterprises are defending themselves.

    Learn the very latest industry data on DDoS attacks and defenses from the just released Neustar DDoS Attacks and Protection Report. Learn what the trends mean for your website and your business.

    Speaker

    Photo Speaker Name Profile
    Anthony Chadd Anthony Chadd View Profile
  • How you Ingest, Analyse and Act on Threat Intelligence will change Add to Schedule
    Russell Kempley  |   BAE Systems Applied Intelligence   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 7th Oct 11:00 to 11:30

    How you Ingest, Analyse and Act on Threat Intelligence will change

    Over the last few years Threat Intelligence has rapidly developed to become an essential component of organisation’s security defences. But it’s far from fully matured and there are some significant differences in the way intelligence functions are being built and integrated. BAE Systems has long been involved with the business of intelligence and will share some insights and predictions as to how the capability, and the industry that supports it, will evolve. This will cover the essential requirements and optimal exploitation for intelligence that will provide valuable situational awareness. Also discussed will be the paradox that intelligence needs to be shared to protect as many organisations as possible while also keeping it secure.

    Speaker

    Speaker Name Profile
    Russell Kempley View Profile
  • It’s Time to Disrupt the Disruptors Add to Schedule
    Tony Rowan  |   Exclusive Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 11:00 to 11:30

    It’s Time to Disrupt the Disruptors

    “In the midst of chaos, there is also opportunity”
    – Sun Tzu, “The Art of War” ( 孫子“孫子兵法”)

    Our workforces are more mobile than ever before with a huge array of device and application options at their fingertips. Because of the inexorable move to a highly mobile workforce and the business efficiencies this brings, there is a commensurate growth in the desire and the ability of threat actors to exploit mobile access. In this session, we will explore the types of threats that mobile enterprise workforces face and the impact they can have. We’ll look at some examples of mobile malware and we’ll look at the tools that can help an organisation contextualise and mitigate these threats.

    Speaker

    Photo Speaker Name Profile
    Tony Rowan Tony Rowan View Profile
  • The pressure of legislation on Data Centres – Will modular ease the squeeze? Add to Schedule
    Leo Craig  |   Riello UPS Ltd   |   The Modern Data Centre

    The Modern Data Centre Theatre

    Wed 7th Oct 11:00 to 11:30

    The pressure of legislation on Data Centres – Will modular ease the squeeze?

    Covering the range of legislative changes affecting data centres, Leo Craig, General Manager of Riello UPS Ltd, explores the pros and cons of utilising a Modular UPS system to help meet energy efficiency targets.

    Speaker

    Speaker Name Profile
    Leo Craig View Profile
  • How will trying to reuse waste heat shape the future data centre? Add to Schedule
    Prof. Ian Bitterlin  |     |   Data Centre Keynote

    Data Centre Keynote Theatre

    Wed 7th Oct 11:00 to 11:30

    How will trying to reuse waste heat shape the future data centre?

    Energy effectiveness metrics are being written in ISO Series 30134 and will include the reuse of waste heat. The reuse of waste heat could go some way to mitigating exponential data growth coming from the Internet of Things and Social Networking but could impact upon both the size and location of data centres of the future.  This presentation reviews the problem and the variety of solutions.

    Speaker

    Photo Speaker Name Profile
    Prof. Ian Bitterlin Prof. Ian Bitterlin View Profile
  • Data Science: A taste of random decision forests on Apache Spark Add to Schedule
      |     |   Hadoop Technology

    Hadoop Technology Theatre

    Wed 7th Oct 11:00 to 11:30

    Data Science: A taste of random decision forests on Apache Spark

    Apache Spark continues to gain momentum as the new processing paradigm for Apache Hadoop, and for the data scientist, it has a lot to like: natively distributed, REPL, Python APIs in addition to native Scala, and a library of machine learning algorithms, MLlib.

    Spark includes an implementation of random decision forests, an important and popular ensemble classifier/regressor algorithm. This talk will introduce Spark, Scala, and random decision forests to the curious, and demonstrate the process of analyzing a real-world data set with them.

    Speaker

    Speaker Name Profile
    View Profile
  • Securing Our Future Add to Schedule
    Mikko Hypponen  |   F-Secure  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 11:00 to 11:30

    Securing Our Future

    If we want to secure our online future, we only have two problems to solve: Privacy and Security. Our online privacy is being eroded by multinational companies that make billions with our data. However, there doesn't seem to be anything illegal in that, as end users happily accept any cost to get their 'free' services. On the other hand, our online security is being targeted by groups that are willing to break the law. This includes both the criminals that do their attacks to make money as well as governments that do it for surveillance and espionage purposes. How do we secure our online future?

    Speaker

    Photo Speaker Name Profile
    Mikko Hypponen Mikko Hypponen View Profile
  • Containers and Kubernetes: Taking Virtualisation to the next level Add to Schedule
    Mandy Waite  |   Google Cloud Platform  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 11:00 to 11:30

    Containers and Kubernetes: Taking Virtualisation to the next level

    Containers are at the forefront of a new wave of technology innovation but the methods for scheduling and managing them at scale are nascent and still under development. Turns out that Google have been scheduling and managing containers for some time now and in this talk we'll look at how we do it at Google and at how the lessons we've learned have fed into the design and development of Kubernetes, an open source cluster management and container orchestration platform.

    Speaker

    Photo Speaker Name Profile
    Mandy Waite Mandy Waite View Profile
  • Wed 7th Oct 11:40 - 12:10
  • Backup and Recovery – A Priceless Combination? Add to Schedule
    Michael Cade  |   Veeam Software  |   Backup and Recovery

    Backup and Recovery Theatre

    Wed 7th Oct 11:40 to 12:10

    Backup and Recovery – A Priceless Combination?

    Performing backup checks is extremely important. But what good is a backup if you can’t rely on it? Learn about next generation backup technology and the latest recovery options, including agentless backup, to guarantee flexible recovery of your data.

    Speaker

    Photo Speaker Name Profile
    Michael Cade Michael Cade View Profile
  • Making the All-Flash Data Centre a Reality Add to Schedule
    Shachar Fienblit  |   Kaminario   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 11:40 to 12:10

    Making the All-Flash Data Centre a Reality

    All-flash arrays are obviously a huge success in data centers. They offer much higher performance and simplicity. But what kind of arrays will meet the challenges of big data, virtualization, real-time analytics, and the Internet-of-Things? In this session we will show how Kaminario enables customers to gain the great benefits of a scalable All-Flash array for a cost that is lower than a Hybrid array.

    Speaker

    Photo Speaker Name Profile
    Shachar Fienblit Shachar Fienblit View Profile
  • Brought to you by Citrix Add to Schedule

    Application Virtualisation Theatre

    Wed 7th Oct 11:40 to 12:10

  • Are anonymizers compromising your network security? Add to Schedule
    Jay Klein  |   Allot Communications   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 11:40 to 12:10

    Are anonymizers compromising your network security?

    User mobility and applications in the cloud pose new challenges to the security of your enterprise network.
    Safeguarding the enterprise requires a comprehensive approach combining granular application visibility and protection not only against external threats but also new kinds of internal threats.

    Speaker

    Photo Speaker Name Profile
    Jay Klein Jay Klein View Profile
  • Brought to you by NetApp Add to Schedule

    Hybrid Cloud Theatre

    Wed 7th Oct 11:40 to 12:10

  • Reimagining the office: architecting the new digital, mobile-first workplace Add to Schedule

    Wireless & Mobile Theatre

    Wed 7th Oct 11:40 to 12:10

    Reimagining the office: architecting the new digital, mobile-first workplace

    The nature of work is changing – multiple screens, ad-hoc meetings, collaborative working, and non-routine schedules. As a result facilities and IT groups are adjusting their physical and technology designs to accommodate this new style of working. Learn how leading organizations are using Aruba and HP technologies to create the next-generation office space.

  • Game Changing Technology to Address the #1 Service Assurance Challenge for IT – Improve Problem Identification and Alerting Add to Schedule
    Ray Krug  |   NetScout Systems, Inc.   |   Machine Data, Monitoring and Analytics

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 11:40 to 12:10

    Game Changing Technology to Address the #1 Service Assurance Challenge for IT – Improve Problem Identification and Alerting

    With lots of ‘moving parts’, today’s troubleshooting approaches rely on large War Rooms with finger-pointing hindering quick resolution. The network is the eyes and ears of the Fully Connected World. Learn how ‘listening’ to the network traffic effectively, enables Holistic Service Assurance and Triaging Capabilities reducing MTTR, and preserving service performance. This session will explore the challenges of Service Assurance for today’s IT team managing multiple critical Business Applications and Unified Communications. These services, delivered over the converged network on physical and virtualized platforms, front-ended using Citrix, all leveraging service enablers such as DNS, LDAP, and Active Directory.

    Speaker

    Photo Speaker Name Profile
    Ray Krug Ray Krug View Profile
  • These aren’t the droids you are looking for… Add to Schedule
    James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 11:40 to 12:10

    These aren’t the droids you are looking for…

    We live in a world where we are never disconnected, both personally and for many, professionally. This is challenging traditional workforce policies to keep data and information secure. Mobile devices don’t fit neatly into a category of consumer or business – they cross boundaries. Blindly trusting users to use a secure password, take care with sensitive data and always lock the device when unattended is a risky game. These operational challenges combined with the high adoption of Android platforms presents a rather appealing opportunity for the cybercriminals to exploit our personal and corporate security.

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • "Cracking the Code" Understanding advanced adversary motivations and how to defend against them Add to Schedule
    Deepak Rajgor  |   Palo Alto Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 11:40 to 12:10

    "Cracking the Code" Understanding advanced adversary motivations and how to defend against them

    Advanced adversaries, bent on accessing digital assets or disrupting business operations, have a sophisticated range of tools available to accomplish their task. Depending on their motivations they invariably deploy the right tool for their purposes. There's no need for a rocket launcher when a lock-pick will do.

    Defenders on the other hand need a combination of people, process and technology. Having only one of the components invalidates the other. For instance, the greatest security products in the world can’t prevent attacks if they are not configured and monitored correctly. Raising the barrier against cyber threats requires ensuring that adversaries need rocket launchers and not lock-picks. In short, avoiding being the low hanging fruit for adversaries.

    Speaker

    Photo Speaker Name Profile
    Deepak Rajgor Deepak Rajgor View Profile
  • Brought to you by Alternative Add to Schedule

    The Modern Data Centre Theatre

    Wed 7th Oct 11:40 to 12:10

  • How to build a future-proof data centre infrastructure? Add to Schedule
    Vincent Liebe  |   Minkels   |   Data Centre Keynote

    Data Centre Keynote Theatre

    Wed 7th Oct 11:40 to 12:10

    How to build a future-proof data centre infrastructure?

    The role of data centres is rapidly changing driven by the cloud, data growth, IT cost reduction, etc. This creates new challenges when it comes to the design & build in order to future proof the data centre infrastructure. Minkels believes that modularity and total integration of the infrastructure's components is key to addressing these challenges. Only then can the right level of flexibility and efficiency be obtained to ensure a consistent optimal performance throughout the infrastructure’s life span and at the lowest possible cost of ownership. The speaker covers this theme by using practical examples.

    Speaker

    Photo Speaker Name Profile
    Vincent Liebe Vincent Liebe View Profile
  • Big Data Security Analytics On Hadoop Add to Schedule
    Syed Rafice  |   Cloudera   |   Hadoop Technology

    Hadoop Technology Theatre

    Wed 7th Oct 11:40 to 12:10

    Big Data Security Analytics On Hadoop

    Everyone is talking big data security analytics but is anyone actually doing it? Hasn't the industry been delivering big data security analytics for years and 'big data' is just a new buzzword? In this panel we'll explore big data platforms like Hadoop and their role in security analytics, the new solutions these big data platforms are enabling, and how firms are deploying these solutions today.

    Speaker

    Photo Speaker Name Profile
    Syed Rafice Syed Rafice View Profile
  • Protecting the Enterprise in 2016 and Beyond Add to Schedule
    Richard Knowlton  |   Vodafone  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 11:40 to 12:10

    Protecting the Enterprise in 2016 and Beyond

    The former Group Corporate Security Director for Vodafone and now Chief Executive of the non-profit Internet Security Alliance for Europe (ISAFE) is one of the most respected security experts in the world. From protecting Vodafone customers and the reputation of the telco in some of the toughest markets in the world, to now advising major corporates on the right security strategy to minimise risk and boost competitiveness, Richard will bring that experience to this keynote talk and outline some of the approaches that Boards need to consider in managing systemic cyber risks to enterprises in the years ahead

    Speaker

    Photo Speaker Name Profile
    Richard Knowlton Richard Knowlton View Profile
  • Migrating the runbook - a journey from legacy to DevOps Add to Schedule
    Mark Phillips  |   Ansible Inc  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 11:40 to 12:10

    Migrating the runbook - a journey from legacy to DevOps

    Technology has been a business enabler for decades, but as time goes on progress often gets trapped under the weight of delivery. Modern ideas like DevOps are designed to enable agility, but how can we adopt them without upsetting the reliance on what is already in place?

    Speaker

    Photo Speaker Name Profile
    Mark Phillips Mark Phillips View Profile
  • What’s Next in Cloud Computing? Add to Schedule
    Mark Russinovich  |   Microsoft Corporation  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 11:40 to 12:10

    What’s Next in Cloud Computing?

    In this session, Microsoft Azure Chief Technology Officer Mark Russinovich shares his views on key trends in cloud computing, including containers and microservices, IoT and Big Data, and hybrid computing, and offers insights into how organizations can stay on the leading edge of these developments.

    Speaker

    Photo Speaker Name Profile
    Mark Russinovich Mark Russinovich View Profile
  • Converged IP Networks – The key building block base of your Unified Communications and Applications Strategy Add to Schedule
    Alan Mackie  |   Gamma   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 7th Oct 11:40 to 12:10

    Converged IP Networks – The key building block base of your Unified Communications and Applications Strategy

    In today’s demanding environment on the IT and Telecoms infrastructure, and on the teams that have to deliver solutions for the business, separate voice, data and mobile services just do not cut it. Businesses run on and gain advantage from the applications that they run, and the key component to enabling IT teams to deliver these services is an IP network that can support multiple applications and deliver them, securely and reliably, to users in any location. So if you are challenged by your business to deliver more applications within a lower overall IT budget, then this seminar is for you.

    Speaker

    Photo Speaker Name Profile
    Alan Mackie Alan Mackie View Profile
  • Wed 7th Oct 12:20 - 12:50
  • Are you aiming for mountains of Awesomeness or molehills of mediocrity from your storage performance? Add to Schedule
    James Smith  |   PernixData   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 12:20 to 12:50

    Are you aiming for mountains of Awesomeness or molehills of mediocrity from your storage performance?

    Storage performance is a current hot topic in the world of Virtualization and there are many approaches to solving the problem of delivering the performance your virtual machines are demanding in a cost effective scalable way. During this session PernixData will explain how they have approached this problem and by changing the way VMware interacts with storage, you remove this problem from your existing and future environments.

    Speaker

    Photo Speaker Name Profile
    James Smith James Smith View Profile
  • How to ensure user acceptance of desktop and application virtualization technologies. Add to Schedule
    Oliver Sills  |   AppSense   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 7th Oct 12:20 to 12:50

    How to ensure user acceptance of desktop and application virtualization technologies.

    This session explains how managing and optimizing the user experience is proven to improve user acceptance of desktop and application virtualization technologies within an end-user computing environment.

    Speaker

    Photo Speaker Name Profile
    Oliver Sills Oliver Sills View Profile
  • Brought to you by Juniper Add to Schedule
    James Winspear  |   Juniper Networks  |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    James Winspear James Winspear View Profile
  • The keys to your hybrid cloud Add to Schedule
    John Easton  |   IBM  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 12:20 to 12:50

    The keys to your hybrid cloud

    Cloud computing used to be about doing things cheaper;  then it was about being more agile.  Organisations are now starting to realise that cloud - and more specifically hybrid cloud - is the real key to new offerings, new business models and new revenue streams.  According to The Economist Intelligence Unit, over the next two years, client takeup of public and hybrid clouds is set to grow faster than other cloud models, so if so far you've only looked at cloud-enabling on-premises infrastructure, or are yet to start on your cloud journey then you have a big challenge ahead of you!  Based upon his experiences working with many clients on their hybrid cloud transformations, John will describe the key connection points and transformation steps that organisations wishing to adopt a hybrid IT model will need to go through along with the fundamentals that any organisation working with cloud needs to get in place to be successful and deliver on their future business goals.

    Speaker

    Photo Speaker Name Profile
    John Easton John Easton View Profile
  • The Hidden Gem – Is Your Wifi Working? Add to Schedule
    Steve Johnson  |   Ruckus Wireless   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 7th Oct 12:20 to 12:50

    The Hidden Gem – Is Your Wifi Working?

    A summary that articulates the dependence, across all industries, that we now have on wireless technology and how that technology should be working for you. Existing wireless infrastructures are under greater pressure than ever before, and we all have some knowledge of how this stress is set to increase in our own environments. There’s no point or value in investing in business transforming applications and infrastructures if the right people or machines simply can’t connect to them. This includes highlights of the benefits of good wireless, the costs of bad wireless and the positive and negative impacts of each, as well as how excellent wireless is enabling innovation across a spectrum of industries.

    Speaker

    Photo Speaker Name Profile
    Steve Johnson Steve Johnson View Profile
  • How to protect against an ever-changing threat landscape Add to Schedule
    Jason Charalambous  |   ServerChoice   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Wed 7th Oct 12:20 to 12:50

    How to protect against an ever-changing threat landscape

    This seminar will analyse the evolution of modern threats and the effective measures organisations can adopt to detect and respond to them. I’ll also detail the baseline of human, technical and process control interaction that need to be in place for an effective response, and how you can leverage these to be even more efficient. Moreover, this talk will analyse what is being targeted and where organisation should be focusing more to reduce the impact of modern attacks.

    Speaker

    Photo Speaker Name Profile
    Jason Charalambous Jason Charalambous View Profile
  • Securing the digital, mobile-first workplace environment Add to Schedule

    Enterprise Mobility Management & Security Theatre

    Wed 7th Oct 12:20 to 12:50

    Securing the digital, mobile-first workplace environment

    The advent of the today’s mobile workplace brings increased productivity, cost savings and unfortunately risk. A diverse set of apps, endpoints and trends, such as BYOD, are forcing organizations to revisit how they support mobility use-cases securely. Discover how advanced network policy management tools will help connect and protect assets in this new working environment where people connect from anywhere, regardless of role.

  • Future Proofing Your Network Management Strategy Add to Schedule
    John Diamond  |   Entuity   |   Machine Data, Monitoring and Analytics

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 12:20 to 12:50

    Future Proofing Your Network Management Strategy

    Technology Changes. Your network is under constant pressure to operate on leaner budgets while at the same time quickly accommodate new technologies reliably and supply outstanding service delivery. Can your network management solution adapt to these IT requirements?
    This session, Future-Proofing Your Network Management Strategy, will review how to manage both legacy and cutting-edge technologies. We will look at concepts and principles for contemporary network management to get the most from your valuable IT assets. Network complexities and explosive network growth are common occurrences; you will learn how to handle virtualisation, overlay technologies, device support, cloud computing, scalability and more.

    Speaker

    Photo Speaker Name Profile
    John Diamond John Diamond View Profile
  • Next Generation Threat Prevention Strategies for your Data Centre Add to Schedule
    Paul Dignan  |   F5 Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 12:20 to 12:50

    Next Generation Threat Prevention Strategies for your Data Centre

    Paradigm shifts in the cyber security landscape are requiring ever greater defences to keep your data, applications and networks safe. See how F5 technologies can help you protect your organisation across the spectrum of attacks organisations are currently facing.

    Speaker

    Photo Speaker Name Profile
    Paul Dignan Paul Dignan View Profile
  • Are you immune? : Machine-learning technologies for countering advanced insider and external threats Add to Schedule
    Dave Palmer  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 7th Oct 12:20 to 12:50

    Are you immune? : Machine-learning technologies for countering advanced insider and external threats

    A fundamental new approach to cyber defence is needed to detect and investigate threats inside the network. Darktrace leads the way with an approach based on advanced mathematics and machine learning developed at Cambridge University, and government intelligence expertise. Learn why over 100 companies have deployed Darktrace's Enterprise Immune System, benefiting from real-time threat intelligence and reports from GCHQ and NSA experts about organisation-specific threats. A live demonstration and real-world case studies will be presented.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Intrusion ≠ Breach: Reducing Risk via Faster Detection & Response Add to Schedule
    Andrew Hollister  |   LogRhythm   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 12:20 to 12:50

    Intrusion ≠ Breach: Reducing Risk via Faster Detection & Response

    There are usually several activities that occur between an initial intrusion and a data breach. Detecting early indicators such as compromised credentials, command-and-control activity or suspicious lateral movement can often provide the necessary lead time to respond to and neutralize a threat before it leads to a material breach.

    Speaker

    Speaker Name Profile
    Andrew Hollister View Profile
  • Forget North & South...Look East & West Add to Schedule
    Andreas Herden  |   Avaya   |   The Modern Data Centre

    The Modern Data Centre Theatre

    Wed 7th Oct 12:20 to 12:50

    Forget North & South...Look East & West

    The Data Centre is becoming its own mini Internet Of Data. Mega amounts of information need to be stored and accessed immediately set against a backdrop of continual cost and technology challenges. Avaya’s Fabrizio Fiori will take you, the DC owner, on a journey showing how you can sleep easy at night.

    Speaker

    Photo Speaker Name Profile
    Andreas Herden Andreas Herden View Profile
  • PANEL: The Future of Colocation Add to Schedule
    Panel  |  Data Centre Keynote

    Data Centre Keynote Theatre

    Wed 7th Oct 12:20 to 12:50

    PANEL: The Future of Colocation

    The global colocation market is continuing to grow exponentially – is managed hosting the way forward for a more secure and efficient business? We discuss in our panel on the future of colocation.

    Chair: Paul Bevan, Cassini Reviews
    Panelists:
    Greg McCulloch, Aegis Data
    Dick Theunissen, EdgeConneX
    Robin Brown, Colt Technology Services
    Steve Weiner, CenturyLink

    Speakers

    Speaker Name Profile
    Dick Theunissen Dick Theunissen View Profile
    Greg McCulloch Greg McCulloch View Profile
    Paul Bevan Paul Bevan View Profile
    Robin Brown View Profile
    Steve Weiner View Profile
  • Expect the Unexpected Add to Schedule
    Rik Ferguson  |   Trend Micro  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 12:20 to 12:50

    Expect the Unexpected

    We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.

    In this thematic keynote presentation, the speaker will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.

    Speaker

    Photo Speaker Name Profile
    Rik Ferguson Rik Ferguson View Profile
  • True DevOps supports top-down and bottom-up release management Add to Schedule
    Eddy Pauwels  |   Clarive Software  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 12:20 to 12:50

    True DevOps supports top-down and bottom-up release management

    All too often you see DevOps being only associated to Agile and continuous. It shouldn’t. DevOps Is about collaboration between Dev and Ops to effectively and efficiently deliver quality applications “at the speed of business”. Depending on the type of application, the release management approach and the business expectation of “speed” will vary. In this session we will elaborate on this subject and the audience will learn about the key elements required for a DevOps approach that is scalable and flexible to transition along with the organization.

    Speaker

    Photo Speaker Name Profile
    Eddy Pauwels Eddy Pauwels View Profile
  • How WebRTC can improve customer service for financial institutions Add to Schedule
    Sajeel Hussain  |   CafeX  |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 7th Oct 12:20 to 12:50

    How WebRTC can improve customer service for financial institutions

    Smartphones, tablets and consumer comfort with mobile apps has caused upheaval in the way that financial services providers—banks, insurance companies, investment firms, and other organizations—interact with customers.

    Today’s consumer can choose multiple communications channels that include video, chat, email, voice, and even screen sharing, and they can have these conversations from any location or device. In this omnichannel environment, customers not only expect immediate response, they also insist on a consistent, seamless experience across all channels. As a result, financial institutions are actively seeking technologies that can deliver on these heightened expectations and demands.

    This vendor-neutral session will help financial institutions understand how proven WebRTC technologies can be used as a foundation to create a low-cost, efficient and secure engagement platform that unifies the customer journey across all mediums and channels. Among the topics that would be covered are coding and development, integration with backend databases and third party applications, and go-to-market strategies.

    Speaker

    Photo Speaker Name Profile
    Sajeel Hussain Sajeel Hussain View Profile
  • Next Generation Web Application Scanning Add to Schedule
    Gary O’Leary-Steele  |   AppCheck Ltd  |   Cyber Hack

    Cyber Hack Theatre

    Wed 7th Oct 12:20 to 12:50

    Next Generation Web Application Scanning

    Recent trends in web application development have rendered traditional application scanning techniques redundant. Common application frameworks are increasingly moving towards JavaScript and HTML5 based user interfaces that are difficult to crawl and scan automatically. Furthermore, the introduction HTML technologies raise new security concerns that require a new approach to application testing.

    In this talk we introduce application scanning concepts, new testing methodologies and vulnerabilities specific to HTML5 and Next Gen applications.

    Speaker

    Photo Speaker Name Profile
    Gary O’Leary-Steele Gary O’Leary-Steele View Profile
  • PANEL: The Future of Hadoop Add to Schedule
    Panel  |  Backup and Recovery

    Backup and Recovery Theatre

    Wed 7th Oct 12:20 to 13:00

    PANEL: The Future of Hadoop

    Hadoop has changed business processes for millions by allowing for more efficient processing of big data. But as big data gets bigger, what’s next for Hadoop? We will discuss in our panel!

    Chair:Matt Aslett, 451 Group
    Panelists:
    Óscar Méndez, Stratio
    Tugdual Grall, MapR
    Shaun Connolly, Hortonworks
    Sean Owen, Cloudera

    Speakers

    Photo Speaker Name Profile
    Matt Aslett Matt Aslett View Profile
    Óscar Méndez Óscar Méndez View Profile
    Sean Owen Sean Owen View Profile
    Shaun Connolly Shaun Connolly View Profile
    Tugdual Grall Tugdual Grall View Profile
  • PANEL: The Future of the Cloud Add to Schedule
    Panel  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 12:20 to 13:00

    PANEL: The Future of the Cloud

    Join the industry’s top Cloud professionals, including Barak Regev of Google and Mark Russinovich of Microsoft, as they battle it out to determine the future of the Cloud within the enterprise.

    Chairman: Philip Carnelley, IDC Europe
    Panelists:
    Mark Russinovich, Microsoft Azure
    Matt McNeil, Google

    Speakers

    Photo Speaker Name Profile
    Mark Russinovich Mark Russinovich View Profile
    Matt McNeill Matt McNeill View Profile
    Philip Carnelley Philip Carnelley View Profile
  • Wed 7th Oct 13:00 - 13:30
  • Software Defined Infrastructure and Efficiencies in the Data Centre Add to Schedule
    Dave Ridley  |   Lenovo   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 13:00 to 13:30

    Software Defined Infrastructure and Efficiencies in the Data Centre

    Dave will examine the unique and innovative highly efficient offerings that Lenovo can supply today for clients looking to build leaner and greener datacenters. From system design, to deployment alternatives, Lenovo can help you achieve your goals of reducing both CAPEX and OPEX.

    In addition Lenovo is committed to providing all Flash hyper-Converged storage solutions with several major players in this emerging market, to reduce storage hardware costs dramatically. Partnering with Pivot3 a pioneer and innovator in the development of hyper-Converged systems and Arrow ECS, Lenovo offers a high performance best in class All-Flash platform.

    Come and listen to what Lenovo, a leading vendor of Server Infrastructure is doing to address efficiencies in your Data Centre.

    Speaker

    Photo Speaker Name Profile
    Dave Ridley Dave Ridley View Profile
  • Brought to you by ExtraHop Networks Add to Schedule
    Raja Mukerji  |   ExtraHop Networks   |   Machine Data, Monitoring and Analytics

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 13:00 to 13:30

    Speaker

    Speaker Name Profile
    Raja Mukerji View Profile
  • Cyber Security in 2015 - Beyond Belief Add to Schedule
    Carl Leonard  |   Websense   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 13:00 to 13:30

    Cyber Security in 2015 - Beyond Belief

    In this session, Principal Security Analyst, Carl Leonard, digs deep into the Raytheon|Websense threat intelligence network to reveal some cyber security facts that you may find hard to believe.

    Speaker

    Photo Speaker Name Profile
    Carl Leonard Carl Leonard View Profile
  • Stop the bad guys exploiting your DNS Add to Schedule
    Dr Malcolm Murphy  |   Infoblox   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 13:00 to 13:30

    Stop the bad guys exploiting your DNS

    DNS is a great tool for bad guys to exploit. They can use it for DDoS attacks, propagating malware and stealing data from your organisation. And they are: it’s up there with HTTP/S as the most popular attack vector.

    Most people are blissfully unaware that this is happening in their organisation. Learn about how DNS is being exploited today, how this translates into risks to your organisation, and steps you should take to protect your organisation’s data and reputation.

    Speaker

    Photo Speaker Name Profile
    Dr Malcolm Murphy Dr Malcolm Murphy View Profile
  • From SCADA and ICS to the IoT, control of physical things needs to be done securely Add to Schedule
    Andy Swift  |   CNS Group   |   Cyber Hack

    Cyber Hack Theatre

    Wed 7th Oct 13:00 to 13:30

    From SCADA and ICS to the IoT, control of physical things needs to be done securely

    SCADA and ICS are known to be weak, they were never designed to be used in the ultra-connected world we live in now. We have seen lots of attack, lots of examples of things being on the internet, with little or no security, that really shouldn’t be. As an industry we have been complaining and moaning about ICS and SCADA for years. The control of physical things in the real world, needs to be done securely. But now with the internet of things, controlling physical things remotely is becoming common place, you can turn your lights on over the internet…

    Speaker

    Photo Speaker Name Profile
    Andy Swift Andy Swift View Profile
  • Radical Agility: Continuous Innovation at Scale Add to Schedule
    Eric Bowman   |   Zalando  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 13:00 to 13:30

    Radical Agility: Continuous Innovation at Scale

    Zalando is one of the fastest growing companies in European history. In a short span of time,  our team has built what many people thought was impossible: a profitable, pan-European ecommerce platform that consistently delights our millions of customers. Now Zalando is going to disrupt the global fashion industry by building a platform for connecting people with fashion. In this talk, we’ll learn how Zalando is organizing itself and architecting its systems to empower the best engineers to deliver the best products at scale.

    Speaker

    Photo Speaker Name Profile
    Eric Bowman Eric Bowman View Profile
  • Office 365: Risk or reward? Or both? Add to Schedule
    Orlando Scott-Cowley  |   Mimecast   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 13:00 to 13:30

    Office 365: Risk or reward? Or both?

    Office 365 should already be considered critical infrastructure and a matter of national security. The risks to the government grow as more services make the move. There is a very real possibility that problems affecting Office 365 could bring down the daily function of the country as a whole. It is naïve to think that Microsoft can operate their environment flawlessly for all time and that this scenario will never come to pass. Office 365 is a complex single environment machine – and complex machines break no matter how much effort is applied to keep them up. Service level agreements mean little if an entire country goes substantially offline even for an hour. At the very least, government should be mandating the use of 3rd party backup and continuity services in order to mitigate against the inevitable “bad day”.

    Speaker

    Photo Speaker Name Profile
    Orlando Scott-Cowley Orlando Scott-Cowley View Profile
  • Wed 7th Oct 13:40 - 14:10
  • Brought to you by Pure Storage Add to Schedule

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 13:40 to 14:10

  • Automating Systems Management: Patching, Deployment and System Building made easy Add to Schedule
    Jonathan Lange  |   baramundi software AG   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 7th Oct 13:40 to 14:10

    Automating Systems Management: Patching, Deployment and System Building made easy

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software whilst avoiding complex repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Jonathan Lange Jonathan Lange View Profile
  • What five things you need to know when building your digital future and how to do them without starting again Add to Schedule
    Naser Ali   |   Interoute   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 13:40 to 14:10

    What five things you need to know when building your digital future and how to do them without starting again

    Traditional IT, great for stable systems of record is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. This session outlines ways of exploiting new architectures to enable both systems; building them to support your existing platforms, with an eye for the future.

    Technologies such as Docker and the hyper-convergence of computing, networking and storage creates a platform for consolidation, migration and enabling digital transformation.

    Speaker

    Photo Speaker Name Profile
    Naser Ali Naser Ali View Profile
  • Digital Transformation – The Second Industrial Age Add to Schedule
    Len Padilla  |   NTT Communications   |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 13:40 to 14:10

    Digital Transformation – The Second Industrial Age

    We’ve all made it through the first wave of enterprise computing, but what’s next? We hear about Digital Transformation and the Digital Enterprise, but isn’t that just for Silicon Valley tech companies? Join Len while he presents a few examples of industries that have embraced new technologies to make their traditional business better and how you might be able to do the same.

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • Wi-Fi Innovation – Is your Current Wi-Fi A Business Enabler or Inhibitor? Add to Schedule
    Charles Burns  |   Xirrus   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 7th Oct 13:40 to 14:10

    Wi-Fi Innovation – Is your Current Wi-Fi A Business Enabler or Inhibitor?

    This session will examine not just the technical requirement, but the financial value of building a Wi-Fi network that delivers a foundation that will take you beyond the 3 year upgrade cycle.

    Does your enterprise’s Wi-Fi just provide user connectivity, or is it a business enabler designed support the organisational vision?

    What if you could eliminate the daily drudge of worrying about # of devices, available bandwidth, performance and security and instead focus on the business analytics and advanced service Wi-Fi promises, is it worth 30 minutes of your time?

    Designing a high performance, highly reliable Wi-Fi infrastructure is not rocket science, we’ve all been doing it for decades, problem is too many are stuck with designs from the 90s. i.e. wait for complaints and then upgrade.

    Today is about building a solid foundation and then seeing what more you can use it for; reliably supporting business critical applications, video conference services, Voice over Wi-Fi and of course Business Intelligence (analytics), is your network ready?

    If your sleep quality, reputation or job depends on the reliability of the network, then this is a seminar you can’t afford to miss.

    Speaker

    Speaker Name Profile
    Charles Burns View Profile
  • Managing Identities for Mobile and Cloud Add to Schedule
    Julian Scott  |   Kaseya   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Wed 7th Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Julian Scott Julian Scott View Profile
  • Application Control & Management – The ‘Silver Bullet’ Add to Schedule
    Liam Puleo  |   HEAT Software (Lumension)   |   Enterprise Mobility Management & Security

    Enterprise Mobility Management & Security Theatre

    Wed 7th Oct 13:40 to 14:10

    Application Control & Management – The ‘Silver Bullet’

    Business Problem : IT needs a ‘Silver Bullet’ that improve visibility and control of systems as well as save’s money and guarantees security.

    Software has a common denominator, it needs to execute to run. By controlling this single process effectively enormous operational and security benefits are possible.

    Speaker

    Photo Speaker Name Profile
    Liam Puleo Liam Puleo View Profile
  • 3 Ways Auditing Needs to be a Part of Your Security Strategy Add to Schedule

    Cyber Threat Protection Theatre

    Wed 7th Oct 13:40 to 14:10

    3 Ways Auditing Needs to be a Part of Your Security Strategy

    Most security strategies employ auditing as an infrequent “once a year” security tactic to determine if the environment meets organizational security standards. But the frequency of changes made to critical systems and resources is far closer to “daily” than you think, with many changes going undocumented. With security dynamically changing every day, shouldn’t you have visibility into the current state of security, at any point in time, and not just “once a year”?

    In this session, we’ll look at a security strategy in three high-level steps, and discuss how auditing should be utilized to make each step stronger. We’ll also take an external auditor’s perspective to demonstrate the kinds of questions that would be asked, to provide some perspective on whether your security strategy needs auditing as a critical component.

  • How Exposed Are We? The Power of OSINT (Live Demo) Add to Schedule
    Tech Leaders  |  Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 7th Oct 13:40 to 14:10

    Speakers

    Photo Speaker Name Profile
    Elad Ben Meir Elad Ben Meir View Profile
    Shay Priel Shay Priel View Profile
  • Brought to you by FireEye Add to Schedule

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 13:40 to 14:10

  • Brought to you by BT & Cisco Add to Schedule

    The Modern Data Centre Theatre

    Wed 7th Oct 13:40 to 14:10

  • Brought to you by SAS Add to Schedule
    Adrian Jones  |   SAS Global Technologies Practice  |   Hadoop Technology

    Hadoop Technology Theatre

    Wed 7th Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Adrian Jones Adrian Jones View Profile
  • Business as Usual Cyber Resilience Add to Schedule
    Charles White  |   Information Risk Management Ltd  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 13:40 to 14:10

    Business as Usual Cyber Resilience

    ...How government and the industry are building risk aware businesses.

    Businesses are facing complex and confusing challenges around cyber security. They often find themselves taking a reactive approach to solving problems rather than implementing proactive risk based strategy that supports wider corporate objectives.

    Together, Richard and Charles will address this challenge and how the cyber security industry and government are working together to build cyber confidence in UK Plc. Drawing on Information Risk Management’s experience across the private and public sectors and new government initiatives, including Cyber Essentials and The CiSP, they will provide delegates with a wealth of actionable advice to implement in their own organisations.

    Speaker

    Photo Speaker Name Profile
    Charles White Charles White View Profile
  • DevOps Patterns and Best Practices Add to Schedule
    Helen Beal   |   Ranger4  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 13:40 to 14:10

    DevOps Patterns and Best Practices

    DevOps promises cultural change and automation that vastly improves the pace of change and the tempo and tone of the working environment but how do people do DevOps?  In this session, Helen Beal will showcase her experiences with organisations she’s worked with on DevOps projects and explain the patterns she sees in organisational evolution and achieving and quantifying DevOps goals such as releasing on demand, shifting left and building quality and security in, failing smart, looking outside-in, and real-time measurement of feature value.

    Speaker

    Photo Speaker Name Profile
    Helen Beal Helen Beal View Profile
  • Architecting the Future: Insights learned building a global infrastructure Add to Schedule
    Matt McNeill  |   Google  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 13:40 to 14:10

    Architecting the Future: Insights learned building a global infrastructure

    Companies of today have an advantage that most companies didn't have 10 years ago: cloud computing. Every day billions of people consume cloud services, with both businesses and consumers clamouring to build and consume on top of the cloud. Yet few people have had a chance to see how the cloud was built, the challenges faced when building key enabling technologies, and the innovations required to deliver what many of us take for granted.

    From hardware to software to the services relied upon by users around the world, Google has pioneered many aspects of modern cloud infrastructure. In this talk, Matt will discuss lessons learned from being on the leading (and sometimes bleeding) edge of cloud computing, and about building and running infrastructure at Google-scale. Matt will also discuss the impacts of cloud on the enterprise of today, including his vision for where the cloud is headed.

    Speaker

    Photo Speaker Name Profile
    Matt McNeill Matt McNeill View Profile
  • Brought to you by Splunk Add to Schedule

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 13:40 to 14:10

  • Why the Internet of Things is so broken, and what can be done about it [Live Hack] Add to Schedule
    Ken Munro  |   Pen Test Partners LLP  |   Cyber Hack

    Cyber Hack Theatre

    Wed 7th Oct 13:40 to 14:40

    Why the Internet of Things is so broken, and what can be done about it [Live Hack]

    It’s easy to put remote controlled chipsets into everyday appliances and gadgets and manage their data in the cloud, but where are the safeguards and security frameworks? We have researched many app enabled “things” from kids toys to kettles and every single one was found wanting. While the findings are fun, the implications are not. We’ll show you how they can create serious security headaches, from giving up Wi-Fi PSKs to being used as network implants.
     

    Speaker

    Photo Speaker Name Profile
    Ken Munro Ken Munro View Profile
  • Wed 7th Oct 14:20 - 14:50
  • Who needs Disaster Recovery? Delivering Hypervisor-Agnostic Replication Add to Schedule
    Darren Swift  |   Zerto Ltd   |   Backup and Recovery

    Backup and Recovery Theatre

    Wed 7th Oct 14:20 to 14:50

    Who needs Disaster Recovery? Delivering Hypervisor-Agnostic Replication

    Demand on IT disaster recovery functions to be more cost effective and efficient is increasingly pushing companies towards cloud-based solutions. This strategy can offer flexibility, convenience and simplicity, however Disaster Recovery in a virtual world can give rise to a new set of potential problems.

    Join Darren Swift from Zerto, as he discusses the benefits of a hybrid, public, and private cloud based disaster recovery strategy and how to avoid some of these issues. He will also explore the benefits of using a technology that is hardware-agnostic, storage-agnositc and hypervisor-agnostic.

    Speaker

    Photo Speaker Name Profile
    Darren Swift Darren Swift View Profile
  • Delivering ultimate user experience & proven ROI - case studies from the Lloyd's insurance market & public sector. Add to Schedule
    Tech Leaders  |  Application Virtualisation

    Application Virtualisation Theatre

    Wed 7th Oct 14:20 to 14:50

    Delivering ultimate user experience & proven ROI - case studies from the Lloyd's insurance market & public sector.

    How do you reconcile the competing demands of reducing the cost of delivering IT services, whilst delivering continual improvement to the end-user experience?
    Cetus Solutions have been doing just this for our clients this for over 15 years, and have amassed a wealth of experience along the way.
    In this seminar we will show, through a series of case studies and demonstrations; how combining technologies from Citrix, IGEL Atlantis and AppSense can provide a proven ROI, whilst delivering a ‘better than a PC’ user experience.

    Speakers

    Photo Speaker Name Profile
    Paul Kiveal Paul Kiveal View Profile
    Rob Sims Rob Sims View Profile
  • Delivering Smart Networks: Skilling the next generation of network engineers Add to Schedule
    Gerard Donohue   |   telent Technology Services Ltd  |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 14:20 to 14:50

  • Journey to the Hybrid Cloud – It’s the Little Things that Matter Add to Schedule
    Chris Rogers  |   Silver Peak   |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 14:20 to 14:50

    Journey to the Hybrid Cloud – It’s the Little Things that Matter

    Hybrid clouds are becoming a reality for many organisations. During the planning for the move to a hybrid cloud several key items are commonly overlooked, only to result in problems and expenses later. In this session we will review the fundamental requirements of a successful move to a hybrid cloud, including how to architect a successful migration and continued operation. Real-life case studies will be presented with before and after metrics.

    Speaker

    Photo Speaker Name Profile
    Chris Rogers Chris Rogers View Profile
  • Overcoming the Challenges of Workload Migration in the modern Data Centre Add to Schedule
    Derek Cheek  |   Vision Solutions   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 14:20 to 14:50

    Overcoming the Challenges of Workload Migration in the modern Data Centre

    In today’s increasingly complex data centres - with a variety of physical, virtual, and cloud platforms - server migrations with traditional tools can be complex, error-prone and require down-time that simply is not acceptable in today’s 24x7, always-on business climate.

    Join this session when Derek Cheek will be taking a look at how to plan and perform migrations effectively. Derek will be reviewing planning methodologies, best practices and successful business strategies that have helped companies to complete complex migrations more quickly, ease the strain on internal IT resources and reduce downtime to near-zero.

    Speaker

    Photo Speaker Name Profile
    Derek Cheek Derek Cheek View Profile
  • How the Cloud is Changing the Deployment of Wi-Fi Add to Schedule
    John Woodbury  |   ADTRAN  |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 7th Oct 14:20 to 14:50

    How the Cloud is Changing the Deployment of Wi-Fi

    Fueled by consumerisation of IT, BYOD, and standards such as 802.11ac, the conventional approach to deploying Wi-Fi is not up to the task. Recent developments in SDN and the introduction of cloud-managed services are opening up a whole new approach to Wi-Fi deployments, offering a much more flexible model for today’s mobile enterprise. In this session, ADTRAN will explore how cloud Wi-Fi is changing the economics for wireless connectivity, providing real-world examples of how organizations are providing ubiquitous Wi-Fi access for employees and guests, while offloading the management of the network to an outside provider.

    Speaker

    Photo Speaker Name Profile
    John Woodbury John Woodbury View Profile
  • Data-centric Security – From “Fences” to “Bodyguards” Add to Schedule
    Charles Foley  |   Watchful Software   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Wed 7th Oct 14:20 to 14:50

    Data-centric Security – From “Fences” to “Bodyguards”

    Enterprises that try to protect their network get BREACHED; those that protect their DATA get sleep at night. On today’s cyber battlefield the old-school mindset of ‘perimeter protection’ through network security is as outdated as chain mail in desert warfare. Only by shifting from network-centric to data-centric security can we stop to the costly, embarrassing breaches. We’ll discuss, dissect, and debate what IT needs to know to leverage data centricity driving adoption of this new paradigm.

    Speaker

    Photo Speaker Name Profile
    Charles Foley Charles Foley View Profile
  • Brought to you by Citrix Add to Schedule

    Enterprise Mobility Management & Security Theatre

    Wed 7th Oct 14:20 to 14:50

  • How PRTG can change your life. And improve your prawn cocktail. Add to Schedule
    Rupert Collier  |   Paessler AG   |   Machine Data, Monitoring and Analytics

    Machine Data, Monitoring and Analytics Theatre

    Wed 7th Oct 14:20 to 14:50

    How PRTG can change your life. And improve your prawn cocktail.

    Unified Monitoring 4.0 is no longer just about hardware, software, networks and bandwidth. It's about encompassing and meeting the demands of the 21st century user. Millennials and "Generation Y-ers" expect more. More from their employers and more from their IT.

    Preparing your corporate IT infrastructure for the endless waves of all-pervasive connectivity and mass IP convergence is no mean feat.

    Come and find out how a monitoring solution, built with German precision engineering and coupled with consumer style usability, is changing the lives of guys and girls fighting fires in IT departments across the globe.

    And, of course, why it's become so important for shrimps.

    Speaker

    Photo Speaker Name Profile
    Rupert Collier Rupert Collier View Profile
  • The Next Cyber War - Geo-Political Events and Cyber Attacks Add to Schedule
    Werner Thalmeier  |   Radware   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 14:20 to 14:50

    The Next Cyber War - Geo-Political Events and Cyber Attacks

    The last few years we are facing a significant increase of geopolitical events and conflicts. As a matter of fact, each political conflict has included now or is followed by cyber-attacks. In other words, as mankind physically struggles with each other, there has been new outgrowth with corollary cyber techniques.

    In this session we will look into the details of those attacks, the evolving threat landscape and cyber techniques. We will also cover strategies and required technologies for survival.

    Speaker

    Photo Speaker Name Profile
    Werner Thalmeier Werner Thalmeier View Profile
  • Quantum Cryptography – The Future of Cyber Security Add to Schedule
    Kelly Richdale  |   ID Quantique  |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 7th Oct 14:20 to 14:50

    Quantum Cryptography – The Future of Cyber Security

    Quantum computers are hitting the headlines with announcements of new technology breakthroughs as well as every higher investments by government and companies, such as Google and IBM. Once the exclusive domain of science fiction, it is now established that a quantum computer will be feasible within the next decade. The impact on today’s established cryptographic primitives will be huge – specifically it will render today’s public key cryptography, such as RSA and ECC, vulnerable – and governments and industry are starting to prepare for changes to their crypto schemes. In 2014 ETSI called for a move to “quantum-safe” crypto, Ars Technica talks about a “crypto apocalypse”, and even the NSA has issued a public call to upgrade their recommended Suite B algorithms to be “quantum-resistant”.  

    In this session we will get rid of the hype and talk about how quantum technologies can be used to improve security in a holistic risk management approach.

    Speaker

    Photo Speaker Name Profile
    Kelly Richdale Kelly Richdale View Profile
  • Brought to you by HP Add to Schedule

    The Modern Data Centre Theatre

    Wed 7th Oct 14:20 to 14:50

  • Optimising your Existing data centre and the impact of Industry standards Add to Schedule
    Rob Elder  |   Keysource  |   Data Centre Keynote

    Data Centre Keynote Theatre

    Wed 7th Oct 14:20 to 14:50

    Optimising your Existing data centre and the impact of Industry standards

    Much has been made about the opportunity for improving data centre energy efficiency. However more needs to be done to look not just at efficiency but at the overall operational performance of a data centre as a whole. Combined with industry best practise for efficiency and management this presentation will also look at the industry certification and standards which effect the data centre. In turn helping providers of data centre services or users of data centre infrastructure to get confidence and independent verification of all aspects of a data centre operation.

    Speaker

    Photo Speaker Name Profile
    Rob Elder Rob Elder View Profile
  • 360 degrees customer view Add to Schedule

    Hadoop Technology Theatre

    Wed 7th Oct 14:20 to 14:50

  • The Looming Security Challenge of Shadow IT Add to Schedule
    John Madelin  |   Verizon  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 14:20 to 14:50

    The Looming Security Challenge of Shadow IT

    Traditionally Shadow IT referred to cloud IT being bought and used outside IT.  In fact, Shadow IT reflects today’s business reality of exploding complexity.
    Acknowledging the scale and pace of change and its nature, grappling with complex many-vendor, many (often conflicting) opinions, is the current reality.
    It is critical that we first understand the meaning of shadow IT, taking a fact-based look at what key changes to navigate as our traditional notion of boundaries and ownership changes.
    We will conclude with practical headlines on which approaches ensure viable cost:risk trade-offs in a changing world.

    Speaker

    Photo Speaker Name Profile
    John Madelin John Madelin View Profile
  • The Journey To Continuous Delivery Add to Schedule
    Benjamin Wootton  |   Contino  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 14:20 to 14:50

    The Journey To Continuous Delivery

    Continuous Delivery is about moving from big, risky, infrequent releases of code towards smaller batches of change, delivered more often.  
    On a pre-existing monolithic system within the traditional enterprise, this can however be easier said than done.  However, it’s a journey that organisations need to make if they are to remain competitive in todays increasingly software driven economy.  
    In this session, we will consider all of the people, process, and technology elements that need to be tackled to move from traditional release cycles towards a Continuous Delivery model.  We will illustrate this with real world examples from the 30+ clients we have worked with over the last year.

    Speaker

    Photo Speaker Name Profile
    Benjamin Wootton Benjamin Wootton View Profile
  • IBM Watson: Enhancing Human Knowledge with Artificial Intelligence Add to Schedule
    Jay Bellissimo  |   IBM Watson  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 14:20 to 14:50

    IBM Watson: Enhancing Human Knowledge with Artificial Intelligence

    Data and information are proliferating at an unprecedented rate and it's simply overwhelming. Human beings, working with the technologies we have today, can't keep up.
     
    What if a system could help us reason over the universe of data that informs the decisions we make and the work we do, every day?
     
    Watson represents a new partnership between technology and people to democratize knowledge. It's revolutionizing the way we discover things learn new things, and make decisions - all at incredible scale.

    Speaker

    Photo Speaker Name Profile
    Jay Bellissimo Jay Bellissimo View Profile
  • Because You’re nobody's Guinea Pig! Know the truth about your migration to cloud telephony and Skype for Business. Add to Schedule
    Rami Houbby  |   NFON UK Ltd  |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 7th Oct 14:20 to 14:50

    Because You’re nobody's Guinea Pig! Know the truth about your migration to cloud telephony and Skype for Business.

    The enduring dominance of Microsoft has enabled millions of organisations to embrace the benefits of Unified Communications within that familiar environment: (MS Lync) Skype for Business. As collaboration platforms go, Skype for Business has the unique advantage of natively integrating with the Microsoft address book contacts, calendar presence and other office applications, as well as more fundamental infrastructure services like Active Directory.

    We know by now that Skype for Business is a powerful and compelling platform, but it has an Achilles’ Heel: it can’t displace your expensive investment in a proper enterprise phone system. It does voice, to a point, but is not capable of even the basic telephony features businesses expect from a PBX – at least not without the considerable costs, overheads and risks that come with integrating that capability at the application level.

    Want to hear more? Come and see for yourself the truth about what you can really do with (MS Lync) Skype for Business if you’ve got seamless, out-of-the-box cloud integration.

    Speaker

    Photo Speaker Name Profile
    Rami Houbby Rami Houbby View Profile
  • A minute in cyber security Add to Schedule

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 14:20 to 14:50

  • Wed 7th Oct 15:00 - 15:30
  • Brought to you by Datto Add to Schedule

    Backup and Recovery Theatre

    Wed 7th Oct 15:00 to 15:30

  • How to innovate within an overcrowded Cloud Market Add to Schedule
    Hans Nijholt  |   1&1 Internet SE  |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 15:00 to 15:30

    How to innovate within an overcrowded Cloud Market

    Many big players in the Cloud Server market offer an overwhelming number of features in their products while new companies provide a very simple cloud server product that makes the difference with its ease-of-use and a successful community approach. This speech will discuss the cloud promises given by the big market players compared to the ease-of-use solutions offered by new providers and the expectations of the market.

    Speaker

    Photo Speaker Name Profile
    Hans Nijholt Hans Nijholt View Profile
  • How to achieve and sustain the ultimate desktop and application user experience Add to Schedule
    David Taylor  |   Lakeside Software   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 7th Oct 15:00 to 15:30

    How to achieve and sustain the ultimate desktop and application user experience

    Building, deploying and managing great desktop and application user experience doesn’t need to be a black art. Join this session to learn how to properly assess, design, rollout and operate the ultimate user experience without a rocket science degree.

    Speaker

    Photo Speaker Name Profile
    David Taylor David Taylor View Profile
  • OnSite, Hosted or Cloud – What unified Communications should you be buying? Add to Schedule
    Dave Macfarlane  |   Gamma Network Solutions  |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 15:00 to 15:30

    OnSite, Hosted or Cloud – What unified Communications should you be buying?

    The Cloud has revolutionised IT services with its asset light model delivering on-demand infrastructures and right sized commercial models, so why when it comes to voice and unified communications are organisations still investing in on site equipment, digital trunks and handsets? Voice is lagging behind in Cloud adoption, so come and learn from Gamma the potential challenges but also the many benefits that come with migrating to a Cloud voice solution. It will enable you to make a good decision and meet your business needs while ensuring you’re getting the greatest value for money.

    Speaker

    Speaker Name Profile
    Dave Macfarlane View Profile
  • Fireside Chat with Docker Add to Schedule
    Ben Firshman  |   Docker  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 15:00 to 15:30

    Fireside Chat with Docker

    With a focus on open source, Ben will talk about developer tools for building distributed apps and taking those distributed apps to production… including hot containerisation topics such as orchestration and security.

    Speaker

    Photo Speaker Name Profile
    Ben Firshman Ben Firshman View Profile
  • Brought to you by Purple WiFi Add to Schedule

    Wireless & Mobile Theatre

    Wed 7th Oct 15:00 to 15:30

  • Business Security Building Blocks Add to Schedule
    Mark James  |   ESET UK  |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Wed 7th Oct 15:00 to 15:30

    Business Security Building Blocks

    We all hear about how your passwords should be ultra-complex and how you need to invest thousands in a qualified IT Expert to put all the latest cutting edge systems in place, but you can easily lower your attack vector by educating your staff and fellow workers on the simpler options in protecting your business. Two- factor authentication, keeping your software up to date, using a good internet security product and making sure your backups are doing what they should, could all help in keeping you safe.

    Speaker

    Photo Speaker Name Profile
    Mark James Mark James View Profile
  • Brought to you by Wallix Add to Schedule

    Enterprise Mobility Management & Security Theatre

    Wed 7th Oct 15:00 to 15:30

  • What Security pros can learn from ShadowIT: Lessons from the Infrastructure and Operations playbook Add to Schedule
    Bo Skeel  |   Bitdefender   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 7th Oct 15:00 to 15:30

    What Security pros can learn from ShadowIT: Lessons from the Infrastructure and Operations playbook

    Talk of ShadowIT happens for a good reason: I&O pros are rolling out projects without consulting the Security department, often choosing unsanctioned solutions to protect their specialized projects – whether it’s VDI, a hybrid cloud project, or anything designed to improve business ops. What do the I&O people know that Security departments don’t? It’s no secret: many conventional security solutions cannot keep up with greater demand for protection AND performance.
     
    This session will provide ‘lessons learned’ from ShadowIT, what the I&O pros know and expect for protection, and why traditional security technologies are rendered useless for the needs of today’s datacenter.

    Speaker

    Photo Speaker Name Profile
    Bo Skeel Bo Skeel View Profile
  • Reduce risk and increase efficiency in data centre cabinets (a.k.a. DCIM) Add to Schedule
    Richard May  |   Raritan Inc.  |   The Modern Data Centre

    The Modern Data Centre Theatre

    Wed 7th Oct 15:00 to 15:30

    Reduce risk and increase efficiency in data centre cabinets (a.k.a. DCIM)

    In this presentation we will be discussing the business benefits for data centre power and environmental monitoring and practical steps you can take to reduce risk and increase efficiency.

    Speaker

    Photo Speaker Name Profile
    Richard May Richard May View Profile
  • Brought to you by IO Data Centres Add to Schedule
    Nigel Stevens  |   IO UK  |   Data Centre Keynote

    Data Centre Keynote Theatre

    Wed 7th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Nigel Stevens Nigel Stevens View Profile
  • AV Can’t Keep Up - And Neither Can Most Sandboxes Add to Schedule
    Dr. Marco Cova  |   Lastline  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 15:00 to 15:30

    AV Can’t Keep Up - And Neither Can Most Sandboxes

    As sophisticated sandboxing technologies rapidly grow in popularity, so too do evasive and stealthy malware designed to defeat these sandboxes. Malware authors attempt to sense their own surveillance in order to sleep, stall or otherwise hide malicious intent to bypass dynamic analysis. Evasive behaviors have increased by over 2000% from 2014-15 alone. Is this another arms race? Are sandboxes destined for the same ineffective fate as signature-based AV technologies?

    Speaker

    Photo Speaker Name Profile
    Dr. Marco Cova Dr. Marco Cova View Profile
  • Outlining the blueprint for a successful DevOps transformation Add to Schedule
    Sunil Rajasekar   |   Lithium  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 7th Oct 15:00 to 15:30

    Outlining the blueprint for a successful DevOps transformation

    For faster time to market businesses need a continuous integration and deployment system in place, a common set of troubleshooting and monitoring tools, and a highly collaborative relationship between engineering and operations as the silos between these once separate teams erode. This transformation is critical for today’s businesses to stay competitive, but does come with its share of pitfalls and challenges.
     
    Outlining the blueprint for a successful cloud/devops transformation, this session will follow Lithium’s journey and outline lessons learned – from getting board buy-in, to implementing technology changes, to fundamentally restructuring teams.

    Speaker

    Photo Speaker Name Profile
    Sunil Rajasekar Sunil Rajasekar View Profile
  • Internet of Things – so what! Add to Schedule
    Jean Turgeon   |   Avaya  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 15:00 to 15:30

    Internet of Things – so what!

    With the marketing machine going into overdrive what does Internet of Things actually mean to the end user? During this session Avaya’s Jean Turgeon will explore the phenomena known as IOT, discuss its impact on you, highlight some of the challenges that will manifest from it and show you the path to enlightenment – how to succeed with IOT

    Speaker

    Photo Speaker Name Profile
    Jean Turgeon Jean Turgeon View Profile
  • Wed 7th Oct 15:40 - 16:10
  • Brought to you by NetApp Add to Schedule

    Enterprise Storage & Data Management Theatre

    Wed 7th Oct 15:40 to 16:10

  • Delivering applications and services from the hybrid cloud, with F5 Networks Add to Schedule
    Kevin Ware-Lane  |   F5 Networks   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Wed 7th Oct 15:40 to 16:10

    Delivering applications and services from the hybrid cloud, with F5 Networks

    Business agility and growth depend on secure, anywhere access to applications regardless of whether they are on-premises, in a private cloud, or in a public cloud environment. In this session we take a look at how F5 is helping deliver applications in a hybrid cloud approach that enables businesses to meet those challenges.

    Speaker

    Photo Speaker Name Profile
    Kevin Ware-Lane Kevin Ware-Lane View Profile
  • Embracing the Cloud - the Data Protection Opportunity Add to Schedule
    Adam Woolford  |   Veeam Software  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Wed 7th Oct 15:40 to 16:10

    Embracing the Cloud - the Data Protection Opportunity

    Learn how to minimise the risk of data loss and reputational damage by enabling low recovery point objectives (RPOs) and facilitating off-site data protection.

    Speaker

    Photo Speaker Name Profile
    Adam Woolford Adam Woolford View Profile
  • Brought to you by Wick Hill Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 7th Oct 15:40 to 16:10

  • Stop Attacks at the Identity Perimeter Add to Schedule
    James Romer  |   SecureAuth  |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 7th Oct 15:40 to 16:10

    Stop Attacks at the Identity Perimeter

    Failing perimeter protection methods are forcing organizations to rethink security strategies and embrace the concept of including identity in their perimeter defenses. In this session, we will show how you can better protect your resources and detect intrusions with new technologies that enable you to treat identity as the perimeter and stop attackers in their tracks.

    Speaker

    Photo Speaker Name Profile
    James Romer James Romer View Profile
  • Why do You Need a Cyber Security Strategy? Add to Schedule
    William Beer  |   Alvarez & Marsal  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 7th Oct 15:40 to 16:10

    Why do You Need a Cyber Security Strategy?

    As threats continue to evolve in both complexity and quantity, senior executives are sitting up and getting involved. It is becoming clear to many that the traditional approach to cyber security is failing and that organisations now need to focus on resilience. A comprehensive and robust cyber security strategy is a fundamental part of the solution to help protect the business and allows the cyber function to operate and be seen as an enabler of business value and growth, rather than a blocker. What are the key components of a modern strategy? How do you ensure it is aligned with the needs of the business? This in depth seminar from one of the world's most highly regarded business security experts will provide valuable insights.

    Speaker

    Photo Speaker Name Profile
    William Beer William Beer View Profile
  • Thinking In Promises for an Internet of Things Add to Schedule
    Mark Burgess  |   Independent  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 7th Oct 15:40 to 16:10

    Thinking In Promises for an Internet of Things

    The traditional way of talking about all aspects of human organization is through commands, requirements, and obligations. However, this tradition is not only presumptuous but actually inconsistent in a logical sense. As we embrace more of the realities of distributed systems for a global world, we need a new way of thinking about intent. In this talk, Mark Burgess explains the motivation for Promise Theory (the subject of his new book Thinking in Promises), and what this means for our technology and interactions in a world of humans and machines.

    Speaker

    Photo Speaker Name Profile
    Mark Burgess Mark Burgess View Profile
  • Wed 7th Oct 16:20 - 16:50
  • Why the global Cyber Security landscape paints a concerning picture Add to Schedule

    Cyber Security Keynote Theatre

    Wed 7th Oct 16:20 to 16:50

    Why the global Cyber Security landscape paints a concerning picture

    As cyber space evolves so do the threats which seek to exploit people, businesses, and even whole countries. Some are driven by financial gain and others by social causes. But the most significant threats we see today are from those with nationalistic motivations or supported by nation states. These actors are more focused in their efforts, better resourced, and can leverage a wide array of capabilities to achieve their mission. In the past year alone we have seen multiple cases involving such actors, and it paints both a concerning picture for global cyber security as well as presenting significant technical and policy challenges. This talk will reflect on some of trends observed in the threat landscape through public reporting, but also draw upon BAE Systems’ insights from responding to cyber attacks and tracking those behind them. We will provide the audience with an update on the why and the how of the most significant cyber attack campaigns we see today.

  • Thu 8th Oct 11:00 - 11:30
  • Is your data secure? Overcoming a cyberattack and VM deletion Add to Schedule
    Tech Leaders  |  Backup and Recovery

    Backup and Recovery Theatre

    Thu 8th Oct 11:00 to 11:30

    Is your data secure? Overcoming a cyberattack and VM deletion

    In this presentation we explore a real life case of how a company’s host provider lost critical business data due to a cyberattack.

    Their customer, Simply Office Solutions, hired data recovery experts Kroll Ontrack to recover the hacked data from a deleted VM, thus helping to safeguard their business continuity and reputation.

    Speakers

    Speaker Name Profile
    Ernesto Lobo Ernesto Lobo View Profile
    Marie Delort View Profile
  • Debunking a few common myths about Data Centre Availability Add to Schedule
    David Spence  |   Veeam Software  |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 11:00 to 11:30

    Debunking a few common myths about Data Centre Availability

    This session will review a few common misconceptions around Data Centre Availability including “Is tape really dead?” and “Why should I follow the 3-2-1 rule?”.

    Speaker

    Photo Speaker Name Profile
    David Spence David Spence View Profile
  • Automating Systems Management: Patching, Deployment and System Building made easy Add to Schedule
    Jonathan Lange  |   baramundi software AG   |   Application Virtualisation

    Application Virtualisation Theatre

    Thu 8th Oct 11:00 to 11:30

    Automating Systems Management: Patching, Deployment and System Building made easy

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software whilst avoiding complex repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Jonathan Lange Jonathan Lange View Profile
  • Brought to you by Citrix Add to Schedule

    Network & Cloud Infrastructure Theatre

    Thu 8th Oct 11:00 to 11:30

  • Digital Disruption Within an Established Organisation Add to Schedule
    Mark Sherwin  |   Accenture Digital  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Thu 8th Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Mark Sherwin Mark Sherwin View Profile
  • What does 802.11ac mean for IT managers, business owners and the future wired and wireless network? Add to Schedule

    Wireless & Mobile Theatre

    Thu 8th Oct 11:00 to 11:30

    What does 802.11ac mean for IT managers, business owners and the future wired and wireless network?

    WiFi is everywhere and is increasingly seen as mission critical for SMBs. If we accept that it’s a utility service, what should organisations be considering when designing their wireless and wired network to ensure it’s reliable, stable and able to meet growing demands?

    With 802.11ac adoption set to overtake 802.11n in 2016, what does this mean for IT managers, business owners and the future wired and wireless network?
    This session will explore migration strategies to leverage both 11n and 11ac cost effectively and consider ways to build resiliency and redundancy into the wired and wireless network as a whole.

  • Incoming! New EU General Data Protection Regulation Add to Schedule
    Greg Iddon  |   Sophos   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Thu 8th Oct 11:00 to 11:30

    Incoming! New EU General Data Protection Regulation

    The proposed European Data Protection Directive could have a huge impact on any organisation that stores or handles information about European citizens… and the changes apply to all EU member states. But how exactly might any changes affect you?

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • Moving from a Data Centre to a Hybrid IT Environment Securely Add to Schedule
    Jeff Green  |   Pulse Secure   |   Enterprise Mobility Management & Security

    Enterprise Mobility Management & Security Theatre

    Thu 8th Oct 11:00 to 11:30

    Moving from a Data Centre to a Hybrid IT Environment Securely

    In today’s world of cloud adoption and SaaS-based applications, the edges of the Data Centre are disappearing. It is becoming increasingly difficult to understand and control who is accessing services and applications. We discuss 10 strategies to help you move securely from a data centre only environment to a hybrid IT model.

    Speaker

    Photo Speaker Name Profile
    Jeff Green Jeff Green View Profile
  • Why Mega Trends are Driving Organisations to Move to Cloud Internet Security Add to Schedule
    Ross Asquith  |   Zscaler   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 11:00 to 11:30

    Why Mega Trends are Driving Organisations to Move to Cloud Internet Security

    Mega trends such as mobility and the ‘always on’ culture, set against a backdrop of escalating threats are all inputting to a mass drive for organisations to move to Cloud based Internet Security. This seminar will examine these trends, explaining both the drivers (Changing Network Traffic Patterns, Cost Reduction and Increased Security Requirements) and the performance and security benefits that are already being enjoyed by thousands of Enterprises across the globe.

    Speaker

    Photo Speaker Name Profile
    Ross Asquith Ross Asquith View Profile
  • Closing the security gap with data-driven threat intelligence Add to Schedule
    Martin Lee  |   Alert Logic   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 8th Oct 11:00 to 11:30

    Closing the security gap with data-driven threat intelligence

    The frequency and severity of cyber attacks are on the rise as cyber criminals adapt their methods of attack for maximum profit: from adopting a mass-market approach for compromising as many organisations as possible, through to more sophisticated attacks that target specific companies. This is why building a cyber security strategy that has data-driven threat intelligence at its core is so critical.

    In this session, Martin Lee, Intelligence Manager discusses why a cyber-threat intelligence capability is so critical, share insights into current threat vectors and how threat intelligence should be integrated into your cyber-security strategy to help countering threats.

    Speaker

    Photo Speaker Name Profile
    Martin Lee Martin Lee View Profile
  • Brought to you by FireEye Add to Schedule

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 11:00 to 11:30

  • Brought to you by Big Technology Add to Schedule

    The Modern Data Centre Theatre

    Thu 8th Oct 11:00 to 11:30

  • Is OpenStack, LINUX for the Cloud? Add to Schedule
    Dr Mike Kelly  |   DataCentred  |   Data Centre Keynote

    Data Centre Keynote Theatre

    Thu 8th Oct 11:00 to 11:30

    Is OpenStack, LINUX for the Cloud?

    LINUX as the spearhead of the Open Source movement, transformed the way that open source was perceived and used from the early nineties. It gave a single standard platform which users and suppliers could both contribute to and rely on, and which effectively guaranteed interoperability. Innovation and new function no longer meant drastic upheaval. Cloud is rapidly becoming the standard execution environment for large scale workloads, whether public or private. OpenStack has an opportunity to become the equivalent of LINUX for the Cloud age.

    Speaker

    Photo Speaker Name Profile
    Dr Mike Kelly Dr Mike Kelly View Profile
  • Data Powered Threat Detection Add to Schedule
    Matt Brandwein  |   Cloudera   |   Hadoop Technology

    Hadoop Technology Theatre

    Thu 8th Oct 11:00 to 11:30

    Data Powered Threat Detection

    As attack surfaces continue to expand, and fraudsters continue to advance their attack techniques, it becomes difficult for organisations to stay ahead of threats with traditional SIEM solutions. This creates a reactive security environment that leads to enterprise breaches that cause monetary and reputational losses. These threats become even more difficult to get ahead as data that holds threat signatures is often archived, deleted, and never touched again.

    In this session we discuss how forward thinking organisations are using Cloudera’s enterprise data hub (EDH), powered by Apache Hadoop, to store, enrich, and analyse data for faster remediation and identification of advanced persistent threats.

    Speaker

    Photo Speaker Name Profile
    Matt Brandwein Matt Brandwein View Profile
  • Digital Privacy: A Requirement To Do Business Add to Schedule
    Phil Zimmermann  |   Silent Circle  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 11:00 to 11:30

    Digital Privacy: A Requirement To Do Business

    In 1991, at the start of the Crypto Wars, the idea of digital privacy was radical.  Today it’s required to do business. Without an expectation our data is secure, online banking cannot work and doctors cannot store medical records electronically. Protecting the privacy of individuals is why I started PGP, and why Mike Janke and I started Silent Circle. But at Silent Circle we’ve come to realise that protecting individuals at work may be the strongest form of corporate security possible. That’s what we’re working on, and I'm going to tell you more about it here.

    Speaker

    Photo Speaker Name Profile
    Phil Zimmermann Phil Zimmermann View Profile
  • On the path to Continuous Delivery? - Get there faster, DevOps your data! Add to Schedule
    Jes Breslaw  |   Delphix   |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 8th Oct 11:00 to 11:30

  • One Cloud Approach to Rule them All – Any App, Any Device Add to Schedule
    Ray O'Farrell  |   VMware  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 8th Oct 11:00 to 11:30

    One Cloud Approach to Rule them All – Any App, Any Device

    Businesses are being transformed by technology in very significant ways and they are looking to use these transformational opportunities to deliver growth, drive competitive advantage, amaze customers, and engage and empower employees – while managing risk and protecting brand value.
    With the wide availability of cloud services? and mobile devices, businesses today are pressed to deliver new and improved services to their end-users at a moment’s notice - and the potential impact to IT teams working in shorter, faster cycles is huge. Ray O Farrell will discuss how IT is delivering against this backdrop and address the questions this transformation is throwing up.

    Speaker

    Photo Speaker Name Profile
    Ray O'Farrell Ray O'Farrell View Profile
  • Driving Video Adoption with Cloud, Hybrid or On Premise – Which Model is Right for You? Add to Schedule
    Tim Stone  |   Polycom  |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 8th Oct 11:00 to 11:30

    Driving Video Adoption with Cloud, Hybrid or On Premise – Which Model is Right for You?

    Perhaps the most critical component in achieving the desired return on technology investments is user adoption, and ensuring accessibility is one of the biggest factors in driving adoption of video solutions. At the same time, organizations have limited IT resources and budgets so they need flexible options for building or expanding their video footprint. With the increasing availability of cloud-based solutions, organizations have a number of choices in how they roll out video, including on-prem, cloud or hybrid deployments. This session will explore the merits of each model and assist you in deciding which approach is right for your organization.

    Speaker

    Photo Speaker Name Profile
    Tim Stone Tim Stone View Profile
  • Thu 8th Oct 11:40 - 12:10
  • From Backup to Always Available Add to Schedule
    Russell Nolan  |   Veeam Software  |   Backup and Recovery

    Backup and Recovery Theatre

    Thu 8th Oct 11:40 to 12:10

    From Backup to Always Available

    This session will look at how to adapt your Backup strategy to meet the requirements of the modern Data Centre.

    Speaker

    Photo Speaker Name Profile
    Russell Nolan Russell Nolan View Profile
  • Brought to you by NetApp Add to Schedule

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 11:40 to 12:10

  • Brought to you by Citrix Add to Schedule

    Application Virtualisation Theatre

    Thu 8th Oct 11:40 to 12:10

  • A Cloud for All Seasons: Vision and Reality Add to Schedule
    Joe Baguley  |   VP & CTO, EMEA  |   Hybrid Cloud

    Hybrid Cloud Theatre

    Thu 8th Oct 11:40 to 12:10

    A Cloud for All Seasons: Vision and Reality

    Innovation in the enterprise is being driven by applications, and the successful development, management, movement and use of applications are the currency for a successful digital transformation.
    But for the large part, organisations don’t have the luxury of building out their IT architecture from scratch. Most are negotiating their own data centers, navigating the public cloud, managing legacy and native cloud applications – all while having to ensure speed, performance and security.
    This paints a somewhat complicated minefield for achieving digital transformation. But does it have to be?
    Joe Baguley, CTO EMEA, VMware will talk about why the answer is no and why there is only the need for one cloud that seamlessly unifies the private and public clouds, that is built for all applications, and that offers the performance that is the reality for digital transformation.

    Speaker

    Photo Speaker Name Profile
    Joe Baguley Joe Baguley View Profile
  • Reimagining the office: architecting the new digital, mobile-first workplace Add to Schedule

    Wireless & Mobile Theatre

    Thu 8th Oct 11:40 to 12:10

    Reimagining the office: architecting the new digital, mobile-first workplace

    The nature of work is changing – multiple screens, ad-hoc meetings, collaborative working, and non-routine schedules. As a result facilities and IT groups are adjusting their physical and technology designs to accommodate this new style of working. Learn how leading organizations are using Aruba and HP technologies to create the next-generation office space.

  • Brought to you by ExtraHop Networks Add to Schedule

    Machine Data, Monitoring and Analytics Theatre

    Thu 8th Oct 11:40 to 12:10

  • These aren’t the droids you are looking for… Add to Schedule
    James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 11:40 to 12:10

    These aren’t the droids you are looking for…

    We live in a world where we are never disconnected, both personally and for many, professionally. This is challenging traditional workforce policies to keep data and information secure. Mobile devices don’t fit neatly into a category of consumer or business – they cross boundaries. Blindly trusting users to use a secure password, take care with sensitive data and always lock the device when unattended is a risky game. These operational challenges combined with the high adoption of Android platforms presents a rather appealing opportunity for the cybercriminals to exploit our personal and corporate security.

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Brought to you by Kaspersky Lab Add to Schedule

    Future of Threat Intelligence Theatre

    Thu 8th Oct 11:40 to 12:10

  • A minute in cyber security Add to Schedule

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 11:40 to 12:10

  • Brought to you by Juniper Add to Schedule

    The Modern Data Centre Theatre

    Thu 8th Oct 11:40 to 12:10

  • Big Data in Financial Services Add to Schedule

    Hadoop Technology Theatre

    Thu 8th Oct 11:40 to 12:10

  • The Six Habits of Highly Successful Cyber Criminals Add to Schedule
    James Lyne  |   Sophos  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
  • Open source technologies for use to deliver CI for Charities Add to Schedule
    Tech Leaders  |  Continuous Delivery

    Continuous Delivery Theatre

    Thu 8th Oct 11:40 to 12:10

    Open source technologies for use to deliver CI for Charities

    Cancer Research is one of the world's largest charities with over a million visitors per month to their main Drupal website. Manifesto have worked closely with Cancer Research on the golden path to full automation and CI.
     
    Multiple Scrum teams are constantly working on two week sprints using Agile methodologies to provide new functionality to the site and currently a team of full time testers are creating & running Behat based test scripts against all functionality of the site.  As the codebase and feature set grows, so does the regression testing.
     
    Cancer research have adopted the use of popular Open Source technologies in an attempt to automate the testing for all features of the site, pathing the way to a full CI solution in the near future.  Pull requests on Github have been used to trigger automated tests giving developers almost instant feedback on the quality of their code and assurance that it won't break other functionality.
    The CI orchestration tool of choice was Jenkins, due to its wealth of community created plugins and cross platform nature. Amazon’s EC2 computing platform has been employed as the workhorse for the Behat scripts with Jenkins being able to create and destroy instances as the workload increases.

    Speakers

    Photo Speaker Name Profile
    David Collard David Collard View Profile
    Paul Kelly Paul Kelly View Profile
  • Brought to you by Linux Foundation Add to Schedule
    Jim Zemlin  |   Linux Foundation   |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 8th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Jim Zemlin Jim Zemlin View Profile
  • Brought to you by Gamma Add to Schedule

    Unified Communications & Collaboration Theatre

    Thu 8th Oct 11:40 to 12:10

  • Thu 8th Oct 12:20 - 12:50
  • Are you aiming for mountains of Awesomeness or molehills of mediocrity from your storage performance? Add to Schedule
    James Smith  |   PernixData   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 12:20 to 12:50

    Are you aiming for mountains of Awesomeness or molehills of mediocrity from your storage performance?

    Storage performance is a current hot topic in the world of Virtualization and there are many approaches to solving the problem of delivering the performance your virtual machines are demanding in a cost effective scalable way. During this session PernixData will explain how they have approached this problem and by changing the way VMware interacts with storage, you remove this problem from your existing and future environments.

    Speaker

    Photo Speaker Name Profile
    James Smith James Smith View Profile
  • How to ensure user acceptance of desktop and application virtualization technologies. Add to Schedule
    Oliver Sills  |   AppSense   |   Application Virtualisation

    Application Virtualisation Theatre

    Thu 8th Oct 12:20 to 12:50

    How to ensure user acceptance of desktop and application virtualization technologies.

    This session explains how managing and optimizing the user experience is proven to improve user acceptance of desktop and application virtualization technologies within an end-user computing environment.

    Speaker

    Photo Speaker Name Profile
    Oliver Sills Oliver Sills View Profile
  • Come Meet the Fabric Add to Schedule
    Billy Turnbull  |   Avaya   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Thu 8th Oct 12:20 to 12:50

    Come Meet the Fabric

    Everything has got easier, we program our home appliances from our smart phones, we stream content to a range of devices at the touch of a button…yet we still configure our networks as if it was the 1980’s! Avaya’s Billy Turnbull will show you an alternative path you can follow, should you wish to accept the challenge: to simplify provisioning, troubleshooting and networking…just how Mum said it should be!

    Speaker

    Photo Speaker Name Profile
    Billy Turnbull Billy Turnbull View Profile
  • The Hidden Gem – Is Your Wifi Working? Add to Schedule
    Steve Johnson  |   Ruckus Wireless   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 8th Oct 12:20 to 12:50

    The Hidden Gem – Is Your Wifi Working?

    A summary that articulates the dependence, across all industries, that we now have on wireless technology and how that technology should be working for you. Existing wireless infrastructures are under greater pressure than ever before, and we all have some knowledge of how this stress is set to increase in our own environments. There’s no point or value in investing in business transforming applications and infrastructures if the right people or machines simply can’t connect to them. This includes highlights of the benefits of good wireless, the costs of bad wireless and the positive and negative impacts of each, as well as how excellent wireless is enabling innovation across a spectrum of industries.

    Speaker

    Photo Speaker Name Profile
    Steve Johnson Steve Johnson View Profile
  • Endpoint Data Protection: The Antidote for Everything Add to Schedule
    Andy Hardy  |   Code42   |   Data Centric Security & IDAM

    Data Centric Security & IDAM Theatre

    Thu 8th Oct 12:20 to 12:50

    Endpoint Data Protection: The Antidote for Everything

    Malware, hardware failure, data migration, data breach, employee churn—the threats to data grow faster than you can fight them. Counteract every data threat by collecting and protecting all the data—and utilizing it to recover, remediate, rebuild. Join Code42 as we demonstrate the benefits of endpoint data protection you haven’t thought of.

    Speaker

    Speaker Name Profile
    Andy Hardy View Profile
  • Securing the digital, mobile-first workplace environment Add to Schedule

    Enterprise Mobility Management & Security Theatre

    Thu 8th Oct 12:20 to 12:50

    Securing the digital, mobile-first workplace environment

    The advent of the today’s mobile workplace brings increased productivity, cost savings and unfortunately risk. A diverse set of apps, endpoints and trends, such as BYOD, are forcing organizations to revisit how they support mobility use-cases securely. Discover how advanced network policy management tools will help connect and protect assets in this new working environment where people connect from anywhere, regardless of role.

  • Next Generation Threat Prevention Strategies for your Data Centre Add to Schedule
    Paul Dignan  |   F5 Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 12:20 to 12:50

    Next Generation Threat Prevention Strategies for your Data Centre

    Paradigm shifts in the cyber security landscape are requiring ever greater defences to keep your data, applications and networks safe. See how F5 technologies can help you protect your organisation across the spectrum of attacks organisations are currently facing.

    Speaker

    Photo Speaker Name Profile
    Paul Dignan Paul Dignan View Profile
  • Brought to you by ExtraHop Networks Add to Schedule
    Raja Mukerji  |   ExtraHop Networks   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 8th Oct 12:20 to 12:50

    Speaker

    Speaker Name Profile
    Raja Mukerji View Profile
  • Cloudy with a chance of breaches Add to Schedule
    Jason Hart  |   Gemalto  |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 12:20 to 12:50

    Cloudy with a chance of breaches

    It’s not a question of “if” it’s a question of “when”. At some point in time, the odds are that your organisation will get hacked. It’s time for us to re-evaluate our security approach from breach avoidance to breach acceptance.

    Speaker

    Photo Speaker Name Profile
    Jason Hart Jason Hart View Profile
  • Brought to you by Alternative Add to Schedule

    The Modern Data Centre Theatre

    Thu 8th Oct 12:20 to 12:50

  • PANEL: The Future of the Data Centre Add to Schedule
    Panel  |  Data Centre Keynote

    Data Centre Keynote Theatre

    Thu 8th Oct 12:20 to 12:50

    PANEL: The Future of the Data Centre

    What will the data centre of the future look like? Is enough being done to reduce the environmental footprint in key locations? Join us as we delve deeper into the role of the data centre and its place in the ever-changing technology landscape.

    Chairman: Prof. Ian Bitterlin, Consultant Engineer
    Panelists:
    Rob Coupland, Telecity Group
    Dr Robert Tozer, Operational Intelligence
    Derek Allen, Global Switch
    Nicola Hays, Andrasta Consulting

    Speakers

    Photo Speaker Name Profile
    Derek Allen Derek Allen View Profile
    Dr Robert Tozer Dr Robert Tozer View Profile
    Nicola Hays View Profile
    Prof. Ian Bitterlin Prof. Ian Bitterlin View Profile
    Rob Coupland Rob Coupland View Profile
  • From Trunk to Tail: How to Incorporate Hadoop into your Enterprise and Save $millions! Add to Schedule
    Ted Orme   |   Attunity  |   Hadoop Technology

    Hadoop Technology Theatre

    Thu 8th Oct 12:20 to 12:50

    From Trunk to Tail: How to Incorporate Hadoop into your Enterprise and Save $millions!

    Making better and faster decisions is a common goal for organisations striving to achieve competitive advantage. And, the more expensive and difficult it is to manage growing data volumes and enable real-time data delivery, the more challenging it is to ensure that your data can provide value to the enterprise.

    Ted will share the Trunk-to-Tail (end-to-end) methods that you can use to solve these challenges by incorporating Hadoop and Attunity technology into your existing IT environment. He’ll focus on how companies can streamline the process of understanding data usage, as well as moving and analysing data and files.

    Speaker

    Photo Speaker Name Profile
    Ted Orme Ted Orme View Profile
  • PANEL: The Future of Cyber Security Add to Schedule
    Panel  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 12:20 to 12:50

    PANEL: The Future of Cyber Security

    The threat of cyber attacks isn’t going away anytime soon and as attacks become more sophisticated, how can businesses ensure they are one step ahead? Join our exclusive cyber security panel to learn about the future of cyber security technologies and how they will adapt to beat the hackers.

    Chair: Prof. Peter Sommer, De Montfort University
    Panelists:
    Dave Palmer, Darktrace
    Troels Oerting, Barclays
    James Lyne, Sophos

    Speakers

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
    James Lyne James Lyne View Profile
    Prof. Peter Sommer Prof. Peter Sommer View Profile
    Troels Oerting Troels Oerting View Profile
  • Brought to you by Puppet Labs Add to Schedule

    Continuous Delivery Theatre

    Thu 8th Oct 12:20 to 12:50

  • Skype for Business and WebRTC: Delivering Across the Board for Enterprises Add to Schedule
    Carl Baptiste  |   Genband  |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 8th Oct 12:20 to 12:50

    Skype for Business and WebRTC: Delivering Across the Board for Enterprises

    This talk will dive into the benefits of integrating WebRTC-based real time communications with both legacy communications systems and business applications to complement and extend these offers. Some of the results include unifying the user experience across multiple third party infrastructures, adding extensibility and providing the enterprise with control of the experience through a streamlined, effective and efficient desktop client.

    Speaker

    Photo Speaker Name Profile
    Carl Baptiste Carl Baptiste View Profile
  • Next Generation Web Application Scanning Add to Schedule
    Gary O’Leary-Steele  |   AppCheck Ltd  |   Cyber Hack

    Cyber Hack Theatre

    Thu 8th Oct 12:20 to 12:50

    Next Generation Web Application Scanning

    Recent trends in web application development have rendered traditional application scanning techniques redundant. Common application frameworks are increasing moving towards JavaScript and HTML5 based user interfaces that are difficult to crawl and scan automatically. Furthermore, the introduction HTML technologies raises new security concerns that require a new approach to application testing.

    In this talk we introduce application scanning concepts, new testing methodologies and vulnerabilities specific to HTML5 and Next Gen applications.

    Speaker

    Photo Speaker Name Profile
    Gary O’Leary-Steele Gary O’Leary-Steele View Profile
  • Brought to you by NetApp Add to Schedule

    Hybrid Cloud Theatre

    Thu 8th Oct 12:20 to 12:50

  • PANEL: The Future of Data Analytics Add to Schedule
    Panel  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 8th Oct 12:20 to 13:05

    PANEL: The Future of Data Analytics

    What role does data analytics play in determining business success? Whether you want to engage with your customers on a more sophisticated level or identify gaps within your business, our panel will look at what the future of data analytics holds and why it’s so important to get it right.

    Chair: Aimie Chapple, Accenture
    Panelists:
    Dr Mark Darbyshire, SAP
    Raj Mistry, Salesforce
    Nick Whitehead, Oracle Business Intelligence
    John Callan, Qlik

    Speakers

    Photo Speaker Name Profile
    Aimie Chapple Aimie Chapple View Profile
    John Callan John Callan View Profile
    Mark Darbyshire Mark Darbyshire View Profile
    Nick Whitehead Nick Whitehead View Profile
    Raj Mistry Raj Mistry View Profile
  • Thu 8th Oct 13:00 - 13:30
  • "Cracking the Code" Understanding advanced adversary motivations and how to defend against them Add to Schedule
    Deepak Rajgor  |   Palo Alto Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 13:00 to 13:30

    "Cracking the Code" Understanding advanced adversary motivations and how to defend against them

    Advanced adversaries, bent on accessing digital assets or disrupting business operations, have a sophisticated range of tools available to accomplish their task. Depending on their motivations they invariably deploy the right tool for their purposes. There's no need for a rocket launcher when a lock-pick will do.

    Defenders on the other hand need a combination of people, process and technology. Having only one of the components invalidates the other. For instance, the greatest security products in the world can’t prevent attacks if they are not configured and monitored correctly. Raising the barrier against cyber threats requires ensuring that adversaries need rocket launchers and not lock-picks. In short, avoiding being the low hanging fruit for adversaries.

    Speaker

    Photo Speaker Name Profile
    Deepak Rajgor Deepak Rajgor View Profile
  • Real world cyber attack deconstructed Add to Schedule
    David White  |   BAE Systems Applied Intelligence   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 13:00 to 13:30

    Real world cyber attack deconstructed

    David will discuss the anatomy of a cyber attack as seen by the BAE Systems Threat Intelligence division. Using specific anonymised intel, David will deconstruct a real cyber attack to explain how threat actors take a persistent, informed and determined approach to breaching an organisation’s security. He’ll discuss the motivations and methods behind these attacks and the tools you need to defend your organisation against the threat.

    Speaker

    Speaker Name Profile
    David White View Profile
  • Eliminating Storage Silos, The Foundation of SmartStack Integrated Infrastructure. Add to Schedule
    Paul Sudlow  |   Nimble Storage   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 13:00 to 13:30

    Eliminating Storage Silos, The Foundation of SmartStack Integrated Infrastructure.

    Storage has always been a huge pain point for organisations burdened by explosive data growth, demanding applications and the need for reliability & data protection! Recently with the emergence of virtual and cloud infrastructure the problems and challenges facing IT decision makers with limited resources have been compounded. In this session we will cover what makes the Nimble Storage Adaptive Flash platform so radically different, why we have become the fastest growing storage company in history, and how organisations are using Nimble Storage as the foundation for service orientated integrated infrastructure with SmartStack - the world’s first Adaptive Flash Integrated reference architecture.

    Speaker

    Photo Speaker Name Profile
    Paul Sudlow Paul Sudlow View Profile
  • Brought to you by Sainbury's Add to Schedule
    Mike Dilworth  |   Sainsbury's  |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 8th Oct 13:00 to 13:30

    Speaker

    Speaker Name Profile
    Mike Dilworth View Profile
  • Thu 8th Oct 13:40 - 14:10
  • Brought to you by CTERA Networks Add to Schedule

    Backup and Recovery Theatre

    Thu 8th Oct 13:40 to 14:10

  • Brought to you by Pure Storage Add to Schedule
    Alex McMullan  |   Pure Storage   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Alex McMullan Alex McMullan View Profile
  • Delivering applications and services from the hybrid cloud, with F5 Networks Add to Schedule
    Kevin Ware-Lane  |   F5 Networks   |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Thu 8th Oct 13:40 to 14:10

    Delivering applications and services from the hybrid cloud, with F5 Networks

    Business agility and growth depend on secure, anywhere access to applications regardless of whether they are on-premises, in a private cloud, or in a public cloud environment. In this session we take a look at how F5 is helping deliver applications in a hybrid cloud approach that enables businesses to meet those challenges.

    Speaker

    Photo Speaker Name Profile
    Kevin Ware-Lane Kevin Ware-Lane View Profile
  • Tools Transformation – overcoming the biggest shortcoming in multi-cloud operations Add to Schedule
    Antonio Piraino  |   ScienceLogic   |   Hybrid Cloud

    Hybrid Cloud Theatre

    Thu 8th Oct 13:40 to 14:10

    Tools Transformation – overcoming the biggest shortcoming in multi-cloud operations

    As Enterprises consider strategic transformation options between renovating the core vs. usage of public cloud services for full production workloads, a number of changes occur among people, process and technologies. Join Antonio as he discusses the BiModal IT phenomenon, and how a transformation in tools can close the gap in modern IT operations by automating processes from discovery through run-operate. This session will create a benchmark for modern management tools that should be additive and seamlessly slot into any modern infrastructure, operational process, and governance parameters, making migration to the Cloud validated and controllable.

    Speaker

    Speaker Name Profile
    Antonio Piraino View Profile
  • Did your Wi-Fi performance run out before the warranty did? The crystal ball to future-proofing your next purchase Add to Schedule
    Ian Bayly  |   Xirrus   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 8th Oct 13:40 to 14:10

    Did your Wi-Fi performance run out before the warranty did? The crystal ball to future-proofing your next purchase

    This session will examine not just the performance requirements, but just as importantly financial value of building a Wi-Fi solution that takes you into the next decade.

    You’re just two years in with a new Wi-Fi network and it’s already straining under the load, what happened? Bottom-line is everyone knew Wi-Fi usage was rapidly increasing, however the actual growth was unprecedented.

    In just a few years the inundation of new devices, higher densities, Social Media and BYOD initiatives overwhelmed traditional Wi-Fi infrastructures, as a result wireless performance, and more importantly its reliability degraded substantially. Yeah, we all saw it happening and in truth it’s no one’s fault, however it’s not a scenario anyone wants to repeat.

    So before you go requesting additional budget for the next upgrade, arm yourself with the knowledge to make sure the next wireless solution supports not only what you expect, but also has the scalability/upgradability to address the unexpected too.

    If your sleep quality, reputation or job depends on the reliability of the network, then this is a seminar you can’t afford to miss.

    Speaker

    Photo Speaker Name Profile
    Ian Bayly Ian Bayly View Profile
  • Brought to you by Wallix Add to Schedule

    Data Centric Security & IDAM Theatre

    Thu 8th Oct 13:40 to 14:10

  • Don’t be another casualty of the cyber war Add to Schedule
    Adrian Brookes  |   Avaya   |   Enterprise Mobility Management & Security

    Enterprise Mobility Management & Security Theatre

    Thu 8th Oct 13:40 to 14:10

    Don’t be another casualty of the cyber war

    With the ever increasing number of cyber attacks Avaya’s Adrian Brookes will show the depths that people will go to get YOUR information, the approaches that can be taken to thwart their attempts and some basic housekeeping on what can be done to prevent the hackers from causing you grief.

    Speaker

    Photo Speaker Name Profile
    Adrian Brookes Adrian Brookes View Profile
  • Brought to you by Tableau Add to Schedule

    Machine Data, Monitoring and Analytics Theatre

    Thu 8th Oct 13:40 to 14:10

  • What’s stopping you being the next big data breach? Add to Schedule
    Orlando Scott-Cowley  |   Mimecast   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 13:40 to 14:10

    What’s stopping you being the next big data breach?

    Hacking big (and small) companies for their data is the new black; at the heart of each and every new hack is usually an innocent looking email which turns out to be a targeted spear-phishing attack. Companies, or their users that fall for these sophisticated, advanced and convincing emails are finding their databases and corporate data are easily stolen and irreparable damage is caused.

    Join this presentation to hear how organisations like yours are being targeted by cyber criminals, hackers and even state sponsored threat actors; and learn how email is at the heart of this new threat. Find out how best to protect your organization with a combination of technology, human awareness, voodoo and just plain good fortune.

    Speaker

    Photo Speaker Name Profile
    Orlando Scott-Cowley Orlando Scott-Cowley View Profile
  • Stop the bad guys exploiting your DNS Add to Schedule
    Dr Malcolm Murphy  |   Infoblox   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 13:40 to 14:10

    Stop the bad guys exploiting your DNS

    DNS is a great tool for bad guys to exploit. They can use it for DDoS attacks, propagating malware and stealing data from your organisation. And they are: it’s up there with HTTP/S as the most popular attack vector.

    Most people are blissfully unaware that this is happening in their organisation. Learn about how DNS is being exploited today, how this translates into risks to your organisation, and steps you should take to protect your organisation’s data and reputation.

    Speaker

    Photo Speaker Name Profile
    Dr Malcolm Murphy Dr Malcolm Murphy View Profile
  • The pressure of legislation on Data Centres – Will modular ease the squeeze? Add to Schedule
    Leo Craig  |   Riello UPS Ltd   |   The Modern Data Centre

    The Modern Data Centre Theatre

    Thu 8th Oct 13:40 to 14:10

    The pressure of legislation on Data Centres – Will modular ease the squeeze?

    Covering the range of legislative changes affecting data centres, Leo Craig, General Manager of Riello UPS Ltd, explores the pros and cons of utilising a Modular UPS system to help meet energy efficiency targets.

    Speaker

    Speaker Name Profile
    Leo Craig View Profile
  • 48hours Later: Cyber Crisis-management at the Speed of Twitter Add to Schedule
    Andrzej Kawalec   |   Hewlett Packard Company  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 13:40 to 14:10

    48hours Later: Cyber Crisis-management at the Speed of Twitter

    The first 48 hours in a crisis are so incredibly important, because they can dramatically impact the next months or years for your organization or the rest of your career. Join industry veteran and CTO of HP’s Enterprise Security Services Andrzej Kawalec as he explores the latest developments in cyber- security and crisis management that will help guide the conversation in your boardroom while keeping your enterprise security out of the newsroom.

    Speaker

    Photo Speaker Name Profile
    Andrzej Kawalec Andrzej Kawalec View Profile
  • Building and Managing Reliable Infrastructure with Chef and Chef Delivery Add to Schedule
    Mandi Walls  |   Chef  |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 8th Oct 13:40 to 14:10

    Building and Managing Reliable Infrastructure with Chef and Chef Delivery

    This talk will provide an overview of Chef's unique perspective on increasing the velocity of service delivery while preserving system reliability through combining tested infrastructure code with tested application code. Chef Delivery gives teams control over the system requirements necessary for the successful deployment and management of their services. Chef itself includes testing tools for the production of tested infrastructures that can be used repeatedly to align systems with requirements. This talk will help DevOps teams looking to provide reliable services for the building and deployment of services in a timely manner understand the challenges and opportunities in CI/CD.

    Speaker

    Photo Speaker Name Profile
    Mandi Walls Mandi Walls View Profile
  • Driving the art of the possible with Open by Design Add to Schedule
    Dr Angel Diaz  |   IBM  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 8th Oct 13:40 to 14:10

    Driving the art of the possible with Open by Design

    An open cloud architecture is today's business imperative and the foundation for tomorrow's competitive advantage. To drive the art of the possible and maximize business value, hybrid clouds must enable portable, interoperable solutions for enterprises. IBM is accelerating innovation for our clients with open dynamic clouds that are built on open technologies that span today's hottest topics. In this session, learn about the benefits of open technologies for enterprise clients and how IBM’s leadership is accelerating key open source communities.  Dr. Angel Diaz presents a roadmap to innovations being delivered by IBM and open communities such as Open Data Platform, Hadoop, Spark, CouchDB, OpenStack, Cloud Foundry, and Docker. Learn how IBM delivers value to our clients on top of open technologies throughout its Cloud and Analytics portfolio in this open dialog.

    Speaker

    Photo Speaker Name Profile
    Dr Angel Diaz Dr Angel Diaz View Profile
  • Brought to you by Big Technology Add to Schedule

    Data Centre Keynote Theatre

    Thu 8th Oct 13:40 to 14:10

  • Thu 8th Oct 14:20 - 14:50
  • Taking Control of Your Storage Future Add to Schedule
    Eyal David  |   Kaminario   |   Enterprise Storage & Data Management

    Enterprise Storage & Data Management Theatre

    Thu 8th Oct 14:20 to 14:50

    Taking Control of Your Storage Future

    In this session we will show how Kaminario enables customers to take control of their storage future and how the K2 All-Flash storage array is a true agile solution that adapts and changes according to the business needs rather than legacy technological barriers.

    Speaker

    Photo Speaker Name Profile
    Eyal David Eyal David View Profile
  • Delivering Smart Networks: Skilling the next generation of network engineers Add to Schedule
    Gerard Donohue   |   telent Technology Services Ltd  |   Network & Cloud Infrastructure

    Network & Cloud Infrastructure Theatre

    Thu 8th Oct 14:20 to 14:50

  • Brought to you by HP Add to Schedule

    Hybrid Cloud Theatre

    Thu 8th Oct 14:20 to 14:50

  • Brought to you by Microsemi Add to Schedule

    Wireless & Mobile Theatre

    Thu 8th Oct 14:20 to 14:50

  • Brought to you by WickHill Add to Schedule

    Enterprise Mobility Management & Security Theatre

    Thu 8th Oct 14:20 to 14:50

  • The Next Cyber War - Geo-Political Events and Cyber Attacks Add to Schedule
    Werner Thalmeier  |   Radware   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 14:20 to 14:50

    The Next Cyber War - Geo-Political Events and Cyber Attacks

    The last few years we are facing a significant increase of geopolitical events and conflicts. As a matter of fact, each political conflict has included now or is followed by cyber-attacks. In other words, as mankind physically struggles with each other, there has been new outgrowth with corollary cyber techniques.

    In this session we will look into the details of those attacks, the evolving threat landscape and cyber techniques. We will also cover strategies and required technologies for survival.

    Speaker

    Photo Speaker Name Profile
    Werner Thalmeier Werner Thalmeier View Profile
  • Brought to you by HP Add to Schedule

    Future of Threat Intelligence Theatre

    Thu 8th Oct 14:20 to 14:50

  • CARM – An Updated Perspective Add to Schedule
    Tony Rowan  |   Exclusive Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 14:20 to 14:50

    CARM – An Updated Perspective

    “The greatest victory is that which requires no battle.”
    – Sun Tzu, “The Art of War” ( 孫子“孫子兵法”)

    The CARM platform is an ongoing development of an integrated approach to cyber security using the best of breed tools available. Given the continued success of a wide range of threat actors against government, commercial and private individuals, it is essential that we respond adequately to the evolution of the attack methods. In this session, we will examine how the CARM (Cyber Attack Remediation and Mitigation) integrated platform is evolving to meet the ever changing threats. We will explore the attack trends and discuss approaches to protecting, detecting and reacting to these threats within the CARM platform and evaluate how organisation can build their own CARM platform.

    Speaker

    Photo Speaker Name Profile
    Tony Rowan Tony Rowan View Profile
  • Software Defined Everything – Lower Costs and Increase Flexibility with a Software Defined WAN Add to Schedule
    Chris Rogers  |   Silver Peak   |   Data Centre Keynote

    Data Centre Keynote Theatre

    Thu 8th Oct 14:20 to 14:50

    Software Defined Everything – Lower Costs and Increase Flexibility with a Software Defined WAN

    The data centre is increasingly becoming ruled by software. Software defined storage, software defined networks, virtual machines, and network function virtualization are all changing the way technology is deployed. In this session we will review the software defined landscape, paying close attention to the Software Defined WAN and how it can lower costs, reduce deployment times, and create a more flexible infrastructure.

    Speaker

    Photo Speaker Name Profile
    Chris Rogers Chris Rogers View Profile
  • Brought to you by Big Technology Add to Schedule

    The Modern Data Centre Theatre

    Thu 8th Oct 14:20 to 14:50

  • Data Discovery and Analytics Add to Schedule

    Hadoop Technology Theatre

    Thu 8th Oct 14:20 to 14:50

    Data Discovery and Analytics

    Siloed data is difficult to access and causes data consumers to only have partial views of the problem at hand. By limiting access to large volumes of disparate data, analysts and business users alike don’t have the ability to included important data in their reports and models leading to suboptimal analytic outputs. Even when this data is available to countless users, traditional systems limit them to querying small volumes of data in order to return the results in a timely matter.

  • Beyond the Right to Be Forgotten: Navigating EU Privacy Laws Add to Schedule
    Greg Callus  |   5RB  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 14:20 to 14:50

    Beyond the Right to Be Forgotten: Navigating EU Privacy Laws

    Businesses of all sizes are factoring in ever more stringent laws on data privacy and breach notification into their business and risk planning, including the stringent new laws from the EU that will have a big impact across all member states. The fragmented and open nature of modern business makes an understanding of the laws paramount. Ignorance is not an option. This session will provide an up to date briefing on the laws you need to know about and how best to ensure compliance.

    Speaker

    Photo Speaker Name Profile
    Greg Callus Greg Callus View Profile
  • How to choose enterprise tools to build out your continuous delivery “toolscape" Add to Schedule
    Rob Vanstone  |   XebiaLabs   |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 8th Oct 14:20 to 14:50

    How to choose enterprise tools to build out your continuous delivery “toolscape"

    It has been said many times that Continuous Delivery & DevOps is much more than just tooling. That said the majority of CD and DevOps initiatives are automation initiatives. Automation does address many of the immediate pain points felt by teams. However the fatal mistake is that these initiatives rarely go beyond the tech teams. This talk will focus on how we can make DevOps compatible with the rest of the organisation.

    Speaker

    Speaker Name Profile
    Rob Vanstone View Profile
  • Evolution of Flash-Based Storage in Virtualized Data Centers Add to Schedule
    Frank Denneman  |   Pernix Data  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 8th Oct 14:20 to 14:50

    Evolution of Flash-Based Storage in Virtualized Data Centers

    Virtualization has revolutionized the modern datacenter. But traditional storage systems are struggling to keep pace, introducing performance bottlenecks that hamper VM performance and create unnecessary cost and complexity. Flash offers the potential for relief, but where is it ideally placed – in the server, storage or both? Is flash the best storage technology going forward? What design principles must be taken into consideration to architect a storage environment that is ideally suited for your virtualized application environment? Join Frank Denneman, PernixData’s Chief Technologist, as he takes a deep dive into these issues.

    Speaker

    Photo Speaker Name Profile
    Frank Denneman Frank Denneman View Profile
  • Thu 8th Oct 15:00 - 15:30
  • Advanced Threat Prevention – man or machine? Add to Schedule
    Garry Sidaway  |   NTT Com Security  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 8th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Garry Sidaway Garry Sidaway View Profile
  • Crypto-Segmentation: Certes CryptoFlows & Security of Networked Applications in the ‘Frictionless Enterprise’ Add to Schedule
    Paul German  |   Certes Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 8th Oct 15:00 to 15:30

    Crypto-Segmentation: Certes CryptoFlows & Security of Networked Applications in the ‘Frictionless Enterprise’

    Digitization of business data and adoption of networked applications create the ‘frictionless enterprise,’ yielding productivity and operational gains.

    But recent data breaches reveal the dark side:

    · Easily shared applications are easier to hack.

    · Digitized data is more vulnerable.

    · Your security is as strong as your least secure partner or employee.

    Certes’ CryptoFlow Solutions address these challenges.

    · One point of control for extending applications safely over any network to any user on any device, with role-based access.

    · Crypto-segmentation contains breaches, blocks hacker lateral movement with compromised credentials.

    · Unified policy management and keying for mobile, PCs, data centers, Clouds, partners, other domains.

    Speaker

    Photo Speaker Name Profile
    Paul German Paul German View Profile
  • Brought to you by Big Technology Add to Schedule

    The Modern Data Centre Theatre

    Thu 8th Oct 15:00 to 15:30

  • The Threat to the UK Banking System Add to Schedule
    Chris Gould  |   EY  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 8th Oct 15:00 to 15:30

    The Threat to the UK Banking System

    The UK has one of the most successful financial services sectors in the world but it is under threat like never before. As the banks embrace digital front ends to enhance convenience and product choice, they open up new threat vectors from attackers looking to exploit vulnerabilities in legacy systems.

    Will the BoE’s CBEST programme help the financial sector prevent this? This seminar will evaluate the systemic risks to the financial sector and the implications of successful and sustained attacks.

    Speaker

    Photo Speaker Name Profile
    Chris Gould Chris Gould View Profile
  • Brought to you by HP Add to Schedule

    Continuous Delivery Theatre

    Thu 8th Oct 15:00 to 15:30

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Manchester (20-21 May 2015) and IP EXPO Europe (7-8 October 2015). The UK & Europe's number ONE cloud computing and IT Event Series

Facebook