Menu

A selection of the most influential people shaping the technology fit for a digital world.


 

 

 

 

 

 

 



Here is a list of all confirmed Seminars for 2016. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 5th Oct 10:00 - 10:40
  • Opening Keynote: Nick Bostrom – Artificial Intelligence and the Future Add to Schedule Nick Bostrom  |     |   Keynote

    Keynote Theatre

    Wed 5th Oct 10:00 to 10:40

    Opening Keynote: Nick Bostrom – Artificial Intelligence and the Future

    This is an incredibly rare opportunity to hear from Nick Bostrom the world’s leading thinker on the implications and potential effects of artificial intelligence and developments in technology. Nick’s work influences the thinking of Stephen Hawking, Elon Musk and Bill Gates and drove them to write an open letter to the world last year discussing Artificial Intelligence and its risk to humanity. This session will share insight into the latest thinking on AI and how our very future will change. This is a session not to be missed.
     

    After Nick Bostrom has delivered the Opening Keynote: Artificial Intelligence and the Future he will follow it with a book signing at 11:15am. A New York Times Bestseller, Superintelligence discusses the fate of our species if machine brains one day come to surpass human brains in general intelligence. Join Nick in the Lounge at Stand V7 where a limited number of his book, Superintelligence, will be on sale for a special discounted price of £8 (rrp £9.99) or bring your own copy for the signing.

    Speaker

    Photo Speaker Name Profile
    Nick Bostrom Nick Bostrom View Profile
  • Wed 5th Oct 11:00 - 11:30
  • Clearing Last Mile Barriers for Cloud Adoption Add to Schedule Mark Russinovich  |   Microsoft Corporation  |   Keynote

    Keynote Theatre

    Wed 5th Oct 11:00 to 11:30

    Clearing Last Mile Barriers for Cloud Adoption

    Mark will describe common barriers for cloud adoption, which typically fall into the areas of cloud security and management. He’ll show how businesses are leveraging a combination of practices, including hybrid cloud principles and solutions, as well as other emerging cloud capabilities to address them. Some of these new innovations are actually convincing companies to move completely to the public cloud on aggressive timelines, and Mark will share examples of how some of the world’s largest, most risk-averse industries have cleared last mile barriers to fully embrace cloud.

    Speaker

    Photo Speaker Name Profile
    Mark Russinovich Mark Russinovich View Profile
  • Judgment Day for Critical Infrastructure Add to Schedule Eugene Kaspersky  |   Kaspersky Lab  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 11:00 to 11:30

    Judgment Day for Critical Infrastructure

    Since the 1970s, a digital revolution has been rocking the world. It has revolutionised the way people and businesses communicate and do business. It has also triggered a massive increase in productivity due to automation. Today we all depend on digital infrastructure. Embedded computers are everywhere; they’re increasingly connected and exchanging data. The problem is they’re not immune to cyberattacks. In his presentation, Eugene Kaspersky will outline his view of the cyberthreat landscape we face, and describe his vision for how to make our digital eco-system safe and secure.
     

    Speaker

    Photo Speaker Name Profile
    Eugene Kaspersky Eugene Kaspersky View Profile
  • Data theft, DDoS attack, Zero Day Vulnerabilities. Discover How to Mitigate Them Add to Schedule Herve Dhelin  |   EfficientIP   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 11:00 to 11:30

    Data theft, DDoS attack, Zero Day Vulnerabilities. Discover How to Mitigate Them

    During this presentation, you will discover the increasing Landscape of DNS Threat.
    We will demonstrate how to mitigate them as DNS servers are not only targets for hackers but can also be used as vector of attacks. Using the DNS protocol itself hackers can exfiltrate data from your network.
    EfficientIP 360 DNS Security solution is the:
    First Adaptive DNS Security Solution
    Only Hybrid DNS Engine available on the market
    Fastest DNS server in the world absorbing 17 millions qps

    Speaker

    Photo Speaker Name Profile
    Herve Dhelin Herve Dhelin View Profile
  • SD-LAN – Defining the Future of the Access Layer Add to Schedule Mathew Edwards  |   Aerohive Networks Europe Ltd   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 11:00 to 11:30

    SD-LAN – Defining the Future of the Access Layer

    Mobility is transforming every aspect of our personal and working lives. And with everyone heading to wireless-first connectivity, that means more users, more devices, more applications, and time to rethink the future of your network.
     
    To deal with this pace of change, you need a software-defined network that works for you, not the other way around.
     
    Discover how to build an adaptable, flexible, and cost-effective network with the SD-LAN.

    Speaker

    Photo Speaker Name Profile
    Mathew Edwards Mathew Edwards View Profile
  • Social Engineering: Are You the Weakest Link? Add to Schedule Greg Iddon  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 11:00 to 11:30

    Social Engineering: Are You the Weakest Link?

    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
     
    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
     
    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • Grow your business by Selling Disaster Recovery with StorageCraft! Add to Schedule Tech Leaders  |  Backup & Availability

    Backup & Availability Theatre

    Wed 5th Oct 11:00 to 11:30

    Grow your business by Selling Disaster Recovery with StorageCraft!

    In this session, discover why over 10,000 MSPs and VARs have chosen StorageCraft as their Disaster Recovery Solution. The StorageCraft ® Recovery Solution™ is the bedrock of business continuity. Protect systems, data, and your peace of mind with verified backups and quick recovery options. Whether your environment is Windows or Linux, physical or virtual, we have you covered.
    Join Chief Sales Engineer John Brennan as he demonstrates the speed, dependability & flexibility of the StorageCraft Recovery Solution. Nigel, Channel Account Manager will illustrate how easy it is to grow your business by selling DR as a Service; thanks to our completely revamped Partner Program launching this October.

    Speakers

    Photo Speaker Name Profile
    John Brennan John Brennan View Profile
    Nigel Brown Nigel Brown View Profile
  • All-Flash is the New Normal. Is that enough? Add to Schedule Richard Fenton  |   Nimble Storage   |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 11:00 to 11:30

    All-Flash is the New Normal. Is that enough?

    All-Flash storage is blazingly fast and is becoming the new normal. But did you know that 54% of application slow-downs are not solved just by deploying All-Flash?
    Join our session where Nimble will announce exciting new functionality and show you how to extend the power of the Predictive Flash Platform towards success and profitability for your business.

    Speaker

    Photo Speaker Name Profile
    Richard Fenton Richard Fenton View Profile
  • Innovative Endpoint Management: Patching, Deployment and System Building simplified Add to Schedule Jonathan Lange  |   baramundi software AG   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 11:00 to 11:30

    Innovative Endpoint Management: Patching, Deployment and System Building simplified

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software whilst avoiding complex repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Jonathan Lange Jonathan Lange View Profile
  • UK Mortgages – Standing Out in the Cloud Add to Schedule Tech Leaders  |  Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 11:00 to 11:30

    UK Mortgages – Standing Out in the Cloud

    As Mortgage Brain’s applications migrate to an online world, Software security and stability are at the forefront of design and hosting. Iain colorfully paints the picture of how choosing the right hosting partner was essential for a successful transition to the Cloud – and how simultaneously juggling implementation with their largest customer project to date added an extra bit of sparkle!

    Speakers

    Photo Speaker Name Profile
    Paul Chambers Paul Chambers View Profile
    Simon Norcott Simon Norcott View Profile
  • Private Cloud? Public Cloud? Why it doesn’t matter! Add to Schedule Adam Richardson  |   Hewlett Packard Enterprise   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 11:00 to 11:30

    Private Cloud? Public Cloud? Why it doesn’t matter!

    For years we have spoken about private clouds versus public clouds, the simple truth is it no longer matters. Join this sessions to hear how customers are using the cloud delivery model across on premise and off premise platforms to enable greater innovation and lower time to value.

    Speaker

    Photo Speaker Name Profile
    Adam Richardson Adam Richardson View Profile
  • Why UCaaS matters; How to enable the App Generation and create a collaborative workforce? Add to Schedule Bradlee Allen  |   Fuze   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 11:00 to 11:30

    Why UCaaS matters; How to enable the App Generation and create a collaborative workforce?

    For years, organizations were buying separate on-premise communication solutions, but the growth of cloud Unified Communications & Collaboration tools is unstoppable! The global market of cloud UC&C is growing from $26.5 billion in 2015 to $62 billion by 2020 (Research and Markets, 2016) and by then will be almost twice as big as the on-premise market.

    It seems that the question for organizations is not whether to go to the cloud, but how, with who and when?

    Therefore, Fuze, presents; Why cloud UCaaS matters to your organization? Learn how too:

    - be ready for new generation workers and attract best in class App Generation talents that demand newest technology
    - increase adoption, satisfaction and productivity amongst workers by offering the same experience from any device and across every location
    - reduce complexity, deployment time and costs by offering a scalable global cloud solution
    - become a leader and let UC&C technology work for you

    Powered by Fuze, the trusted global communications partner to the world’s leading businesses, creating software that empowers their people to interact wherever and whenever they want.

    Speaker

    Photo Speaker Name Profile
    Bradlee Allen Bradlee Allen View Profile
  • Preparing for a new wave of aggressive privacy compliance Add to Schedule Anna Russell  |   Hewlett Packard Enterprise   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 11:00 to 11:30

    Preparing for a new wave of aggressive privacy compliance

    This session will look at the forthcoming General Data Protection Regulations, its fundamental principles and how these will impact enterprise IT and data strategies.

    Speaker

    Speaker Name Profile
    Anna Russell View Profile
  • So you think you’re encrypting…. think again! Add to Schedule Joe Pindar  |   Gemalto  |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 11:00 to 11:30

    So you think you’re encrypting…. think again!

    Everyone knows they have to encrypt their sensitive data, but cryptography is often seen as a dark art and complex – with terms like hashing, tokenization, symmetric and asymmetric… is it any wonder? In this workshop we’ll reveal how encryption and external key management can be a highly effective security control, yet simple to deploy with the right crypto strategy.

    Speaker

    Photo Speaker Name Profile
    Joe Pindar Joe Pindar View Profile
  • Turning the tables in the cyber arms race: practical steps to leverage threat intelligence. Add to Schedule Josh Ellis  |   BAE Systems Applied Intelligence   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 11:00 to 11:30

    Turning the tables in the cyber arms race: practical steps to leverage threat intelligence.

    The BAE Systems Threat Intelligence team are seeing unprecedented attack levels across several sectors. In this talk Josh will discuss an example from the Financial Services sector where a community of organisations are proactively sharing threat intelligence for the greater security of their ecosystem. Josh will discuss a three-pronged approach:

    • Tactical Cyber Incident Response – utilising intelligence-led defence and a normalised response pattern to minimise harm

    • Enhancing the Aggregated View–consistently building upon each attack to give a holistic view of activity across the ecosystem

    • Implementing Preventative Measures – learning from previous attacks to reduce time to detection and manage the risk of further attacks

    Speaker

    Photo Speaker Name Profile
    Josh Ellis Josh Ellis View Profile
  • Why it’s (Sometimes) Good to be Anti-social: Social Engineering Explained Add to Schedule Jason Charalambous  |   ServerChoice   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 11:00 to 11:30

    Why it’s (Sometimes) Good to be Anti-social: Social Engineering Explained

    This seminar will explain just what social engineering is, and how you can protect your business from it's potentially disastrous repercussions. During the seminar you'll learn:

    - What social engineering is.
    - Common forms of social engineering.
    - Live demo of how a social engineering attack is carried out.
    - Most common pitfalls and their impact
    - What businesses can do to protect themselves against social engineering attacks

    Speaker

    Photo Speaker Name Profile
    Jason Charalambous Jason Charalambous View Profile
  • Is IoT developing faster than enterprises can cope with? Add to Schedule Ian Hughes   |   451 Research  |   IoT

    IoT Theatre

    Wed 5th Oct 11:00 to 11:30

    Is IoT developing faster than enterprises can cope with?

    The Internet of Things (IoT) is the next step in enterprise digital transformation after cloud. Are companies ready to embrace the cross silo, cross brand, cross organization interactions that this industry cycle is going to bring? With so many providers and platforms how can they choose where to start? Smart cities and buildings, autonomous cars, Artificial Intelligence and Augmented Reality are all in the mix around the three simple letters of IoT, making boundaries hard to define. This presentation looks at where the industry is and where it may be headed.
     

    Speaker

    Photo Speaker Name Profile
    Ian Hughes Ian Hughes View Profile
  • Seeking to simplify complexity: How to build an effective service management portal Add to Schedule Len Bellemore  |   Alternative Networks   |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 11:00 to 11:30

    Seeking to simplify complexity: How to build an effective service management portal

    As an IT services provider that deals with a multitude of different technologies and customer profiles, it can be increasingly complex to provide customers with the information they need. This session will share some of the drivers behind our decision to create a service management portal, and some of the challenges and successes we’ve had along the way.

    Speaker

    Photo Speaker Name Profile
    Len Bellemore Len Bellemore View Profile
  • Continuous Delivery: Key Success Factors Add to Schedule Dave Clarke  |   Hewlett Packard Enterprise  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 11:00 to 11:30

    Continuous Delivery: Key Success Factors

    This session will describe the organizational and technical underpinnings of Continuous Delivery based on a sample of organizations. The role of automation technologies through the build, test, and deployment activities will be highlighted alongside the key organisational, cultural and management changes needed. The lessons learned by those organizations will be highlighted and the steps necessary to gain significantly improved organizational performance will be discussed to provide a “toolkit” for making faster progress in the adoption of Continuous Delivery.

    Speaker

    Photo Speaker Name Profile
    Dave Clarke Dave Clarke View Profile
  • How infrastructure monitoring with PRTG can change your life. And improve your prawn cocktail Add to Schedule Rupert Collier  |   Paessler  |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 11:00 to 11:30

    How infrastructure monitoring with PRTG can change your life. And improve your prawn cocktail

    Unified Monitoring 4.0 is no longer just about hardware, software, networks and bandwidth. It's about encompassing and meeting the demands of the 21st century user. Millennials and Generation Y-ers expect more. More from their employers and more from their IT.
    Preparing your corporate IT infrastructure for the endless waves of all-pervasive connectivity and mass IP convergence is no mean feat.
    Come and find out how a monitoring solution, built with German precision engineering and coupled with consumer style usability, is changing the lives of guys and girls fighting fires in IT departments across the globe.

    And, of course, why it's become so important for shrimps.
    How efficient monitoring can change your life
    Why it's no longer just about the network
    What makes PRTG the product of choice across the world
    Why the salinity of a shrimp farm is really important

    Speaker

    Photo Speaker Name Profile
    Rupert Collier Rupert Collier View Profile
  • Web Application Security: Challenges Old and New Add to Schedule Gary O’Leary-Steele  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Wed 5th Oct 11:00 to 12:00

    Web Application Security: Challenges Old and New

    The nature and wide variety of security vulnerabilities to be found within web applications mean that, despite typically forming the majority of a host's total attack surface, they cannot be secured by simple firewall rules or simple vendor software patches. Recent trends in application development, namely rich HTML5 applications, have opened up new attack vectors which usually go under the radar of developers (such as cross-origin communication), and this situation is compounded by the fact that traditional web application vulnerability scanning techniques are no longer viable for systems such a single page web applications built upon modern frameworks such as AngularJS. Moreover, classical vectors such as basic Cross-Site Scripting and SQL Injection are still being underestimated and abused to devastating affect despite being covered extensively over the years in security literature.

    Speaker

    Speaker Name Profile
    Gary O’Leary-Steele View Profile
  • Wed 5th Oct 11:40 - 12:10
  • IBM Watson Keynote: Cognitive Computing Add to Schedule Niklaus H. Waser  |   IBM Watson  |   Keynote

    Keynote Theatre

    Wed 5th Oct 11:40 to 12:10

    IBM Watson Keynote: Cognitive Computing

    The cognitive era - how Cognitive Solutions combined with the Internet of Things are transforming the physical and digital world of business

    The combination of Cognitive Solutions and the Internet of Things is fundamentally changing the way businesses create value, companies compete and partner, and consumers experience the world. The digitization of nearly everything is opening new opportunities for insight, relevance, and competitive edge. Learning manufacturing equipment can tell you when it needs maintenance, connected consumer products can tell you how people are actually using them and what’s in demand. Yet so much of the data being generated by connected devices is never captured or acted upon — it is too challenging to manage and analyze, especially in combination with other data sources. Cognitive IoT systems help you make sense of all types of data, and apply these insights to transform core business functions and customer relationships.

    Speaker

    Photo Speaker Name Profile
    Niklaus H. Waser Niklaus H. Waser View Profile
  • Top Cyber Crime & Exploitation Trends Add to Schedule James Lyne  |   Sophos  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 11:40 to 12:10

    Top Cyber Crime & Exploitation Trends

    Join @jameslyne, Global Head of Security Research at Sophos and SANS institute instructor for a tour of the latest and greatest cyber crime tactics, techniques and new opportunities for exploitation. Unfortunately, sessions synopsis are locked months in advance, so all I can say is I’ll talk about the latest interesting trends, research and do some live demonstrations. It will be fun, come along and let’s play with some new tools and hack some [/all the ] things!

    Speaker

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
  • Citrix NetScaler CPX: The power of Application Delivery Services in Containerized Micro-Services Infrastructures Add to Schedule Ignacio Leon  |   Citrix Systems UK Ltd   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 11:40 to 12:10

    Citrix NetScaler CPX: The power of Application Delivery Services in Containerized Micro-Services Infrastructures

    CPX is NetScaler in a container form factor. It is built from the same code base as the NetScaler ADC and is packaged as a Docker container. NetScaler CPX provides the NetScaler web and application load balancing, acceleration, security and offload feature set in a simple, easy-to-install container. Enterprises, cloud and ebusiness service providers can deploy NetScaler CPX in Docker containers managed by popular container management systems.

    Speaker

    Photo Speaker Name Profile
    Ignacio Leon Ignacio Leon View Profile
  • Achieving True High-Density Wi-Fi - The Technical Challenges, Business Drivers, and Commercial Benefits Add to Schedule Adrian Clinton-Watkins  |   GGR Communications Group  |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 11:40 to 12:10

    Achieving True High-Density Wi-Fi - The Technical Challenges, Business Drivers, and Commercial Benefits

    GGR Communications have delivered high-density public Wi-Fi projects at a number of the UK's leading horse racing venues with crowds of up to 70,000 spectators at a single event.

    These projects aren't without their significant challenges and the success is dependent on not just selecting the right hardware vendors but ensuring it is planned, designed and delivered by a talented engineering team who boast vital experience.

    Join them to hear about The Jockey Club's journey into high-density Wi-Fi and what makes it so different from traditional corporate or guest Wi-Fi.

    Speaker

    Photo Speaker Name Profile
    Adrian Clinton-Watkins Adrian Clinton-Watkins View Profile
  • The anatomy of a successful phishing attack. Add to Schedule Dan Sloshberg  |   Mimecast   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 11:40 to 12:10

    The anatomy of a successful phishing attack.

    Last year, 95% of data breaches started with an email. Join Mimecast’s Dan Sloshberg to learn how simplicity, credibility, psychology and urgency are the key factors that make employees the weakest link in your organisation’s security stack, and the steps you can take to stop becoming the next security headline.

    Speaker

    Photo Speaker Name Profile
    Dan Sloshberg Dan Sloshberg View Profile
  • Next Big Thing - under the covers Add to Schedule Paul Parkin  |   Veeam Software UK Ltd  |   Backup & Availability

    Backup & Availability Theatre

    Wed 5th Oct 11:40 to 12:10

    Next Big Thing - under the covers

    Veeam Availability Suite has been extended from the Enterprise on-premises deployments to encompass the hybrid cloud.
    This session will delve deeper into the technologies and focus on Veeam agents, Microsoft Office 365, Veeam Availability Orchestrator. In this session you’ll learn more about:
    * Veeam Agents for Public Cloud and Physical Workloads
    * NEW Veeam ® Backup for Microsoft Office 365 - mitigate the risk of losing access to your email data and ensure Availability to your users.
    * Veeam Availability Orchestrator and Orchestrating your Business Continuity plan.

    Speaker

    Photo Speaker Name Profile
    Paul Parkin Paul Parkin View Profile
  • Post-Brexit UK IT Markets Add to Schedule Martin Hingley  |   ITCandor Limited  |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 11:40 to 12:10

    Post-Brexit UK IT Markets

    What’s going to happen to the IT market after the UK decided to leave the EU? I’ve been conducting surveys since before the referendum and will share my findings with the audience. I’ll attempt to add insights from my continuous research.

    Speaker

    Photo Speaker Name Profile
    Martin Hingley Martin Hingley View Profile
  • Explore Citrix Technologies for Application and Desktop Virtualisation Add to Schedule John Moody  |   Citrix Systems UK Ltd   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 11:40 to 12:10

    Explore Citrix Technologies for Application and Desktop Virtualisation

    Citrix XenDesktop enables IT to mobilise your business, while reducing costs by centralising control and security. Incorporating the full power of Citrix XenApp, XenDesktop can securely deliver full desktops or just apps to any device, over any network, to empower people to work their way. Explore how Citrix can help you migrate to Windows 10 and how Citrix is helping to accelerate, embrace, and mobilise Microsoft’s newest platform with XenDesktop! Citrix and Microsoft unveil “v2” solution for Skype for Business and Windows Server 2016 support within Xenapp!
     

    Speaker

    Photo Speaker Name Profile
    John Moody John Moody View Profile
  • Practical Tips For Digital Transformation Add to Schedule Len Padilla  |   NTT Europe Ltd   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 11:40 to 12:10

    Practical Tips For Digital Transformation

    Digital Transformation is a complex puzzle that organisations worldwide are trying to piece together requiring a rethink of services and applications management across the business. We’ve worked with 100s of business leaders and industry analysts, helping them understand and achieve their own transformation and I’m ready to share these findings with you. This talk will give real-world examples and insights that put you in a strong position to tackle your organisation’s application management and digital transformation.

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • Journey to Enterprise Cloud: Making Datacenter Infrastructure Invisible Add to Schedule Tech Leaders  |  Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 11:40 to 12:10

    Journey to Enterprise Cloud: Making Datacenter Infrastructure Invisible

    Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy datacenter infrastructure built upon of standalone storage. This session will tackle traditional workloads, deploy new scale-out applications, simply operations, reduce costs and make your datacenter infrastructure invisible by embracing these disruptive new technologies. The talk will also cover performance and availability best practices for storage, networking, and compute/virtualization for high performance databases and applications, and server workloads and explore a few examples of production deployments on HCI.

    Speakers

    Photo Speaker Name Profile
    Mike Day Mike Day View Profile
    Paul Phillips Paul Phillips View Profile
  • What Unified Communications Should You be Buying? Add to Schedule David Macfarlane  |   Gamma   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 11:40 to 12:10

    What Unified Communications Should You be Buying?

    The Cloud has revolutionised IT services with its asset-light model delivering on demand infrastructures and right-sized commercial models. So why, when it comes to voice and unified communications, are organisations still investing in on-site equipment, digital trunks and handsets? Voice is lagging behind in Cloud adoption, so come and learn from Gamma the benefits and potential challenges that come with migrating to a Cloud voice solution, so you make a good decision, ensure your business needs are met and it delivers you the best value.

    Speaker

    Photo Speaker Name Profile
    David Macfarlane David Macfarlane View Profile
  • Bridging the Gap Between Public and Private Clouds for Legacy Infrastructure Add to Schedule Tech Leaders  |  Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 11:40 to 12:10

    Bridging the Gap Between Public and Private Clouds for Legacy Infrastructure

    Deciding to migrate your legacy infrastructure to the cloud can often be costly, time consuming and stressful for any business. In this session, Alan Dean, Managing Director of London based managed hosting, cloud and network services provider Coreix, will look to inform and educate IT managers and directors about how Virtual Private Cloud infrastructure can drive a seamless migration to the cloud.

    Speakers

    Photo Speaker Name Profile
    Alan Dean Alan Dean View Profile
    Simon Wilcox Simon Wilcox View Profile
  • Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform Add to Schedule Eran Ashkenazi  |   SentinelOne  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 11:40 to 12:10

    Ransomware vs. SentinelOne's Next-Generation Endpoint Protection Platform

    Presents an introduction to SentinelOne’s endpoint protection platform through the eyes of a unique ransomware attack designed specifically to bypass traditional, and even ‘next-generation’ endpoint security tools. Learn how a behavior-based approach can stop even the cleverest of attacks.

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Security in the datacentre Add to Schedule Chris Knowles  |   NTT Security  |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 11:40 to 12:10

    Security in the datacentre

    Over the years security in the datacentre has evolved. Some organisations are consolidating their security assets deployed in the data centre to reduce cost and simplify management, other are using virtualisation to maximise investment , utilisation and performance where others are using automation to secure consistency across the business, using technologies such as network segmentation. Securing the datacentre does have it’s challenges. Traditional security measures such as traditional firewalls are not suitable, with most of them being at the edge of the datacentre, so once an attacker gets through they are free to move around the datacentre. Organisations need to also ensure they are keeping on top of compliancy and patch management and with increased use of Shadow IT, the security implications are very significant.

    Speaker

    Photo Speaker Name Profile
    Chris Knowles Chris Knowles View Profile
  • Identity Federation – Reaching in to enterprise apps Add to Schedule Chris Mayers  |   Citrix Systems UK Ltd   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 11:40 to 12:10

    Identity Federation – Reaching in to enterprise apps

    To get the most out of identity federation, you need more than just an identity provider, SAML, and a handful of SaaS apps. For mission-critical enterprise and legacy apps, you also need gateways and internal servers that are fluent in identity federation too. Find out how to enable identity federation for the enterprise without having to touch those legacy apps.

    Speaker

    Photo Speaker Name Profile
    Chris Mayers Chris Mayers View Profile
  • Using Predictive Detectors to Track Attackers Add to Schedule Paolo Passeri  |   OpenDNS, now part of Cisco   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 11:40 to 12:10

    Using Predictive Detectors to Track Attackers

    Whether targeted or opportunistic, online threats are becoming increasingly sophisticated and evasive. However, unlike attack vectors, the infrastructures used to launch the malicious campaigns cannot be concealed.

    But what if one could use the analysis of DNS traffic to reveal these infrastructures and turn this information into threat intelligence used not only to protect, but also to predict the next moves of attackers?

    OpenDNS has built such a technology and this session, which includes real world examples, will explain the details of its predictive approach, which tackles the malware from an infrastructure perspective and overtakes the limitations of traditional technologies.

    Speaker

    Photo Speaker Name Profile
    Paolo Passeri Paolo Passeri View Profile
  • Disrupt yourself, before being disrupted Add to Schedule Matthias Roese  |   Hewlett Packard Enterprise   |   IoT

    IoT Theatre

    Wed 5th Oct 11:40 to 12:10

    Disrupt yourself, before being disrupted

    With evolving business models, new competitors are on the rise. Understand how you can start rethinking your business, leveraging IoT. A piece of “IoT technology” will not change your business – it’s the digitisation journey, using IoT technology, paired with ‘Design Thinking’ which will lead you to a successful future in the idea economy. Discover how really traditional companies have had to re-think their business and then successfully outperformed their markets – including some key insights on their endeavours.

    Speaker

    Photo Speaker Name Profile
    Matthias Roese Matthias Roese View Profile
  • Ransomware: Real-Time Detection and Mitigation Based on Network Behaviour Add to Schedule Raja Mukerji  |   ExtraHop Networks   |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 11:40 to 12:10

    Ransomware: Real-Time Detection and Mitigation Based on Network Behaviour

    Ransomware attacks doubled in 2015 and the trend is sure to continue. To meet this growing threat, enterprises must gain real-time visibility into anomalous behaviour. This session explains how organisations can detect and mitigate ransomware attacks using wire data.

    Speaker

    Photo Speaker Name Profile
    Raja Mukerji Raja Mukerji View Profile
  • How Customers are Operationalizing their DevOps Tool Chain from Planning-to-Ops! Add to Schedule Phil Hombledal  |   CollabNet   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 11:40 to 12:10

    How Customers are Operationalizing their DevOps Tool Chain from Planning-to-Ops!

    Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when , why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. Attend this informative session to learn how customers are able to achieve a level of transparency that enables everyone from Planning-to-Ops to make informed decisions based on business priority and leverage automation to accelerate identifying issues and fast fix to drive continuous feedback and KPI insight.

    Speaker

    Photo Speaker Name Profile
    Phil Hombledal Phil Hombledal View Profile
  • Reinventing IT Operations with Data Driven Service Intelligence Add to Schedule Crispin Page  |   Splunk, Inc.   |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 11:40 to 12:10

    Reinventing IT Operations with Data Driven Service Intelligence

    Most organisation’s IT is now facing a new set of challenges with continuous delivery, DevOps, cloud computing and BYOD. There are also more demands placed on the IT Operations team to show value from IT spend, help drive innovation and new revenue streams and also minimise any outages as this effects the bottom line. There is hope however. IT generates machine data and using Splunk this enables you to provide new levels of visibility into the health and key performance indicators of IT services. This improves monitoring of your applications and infrastructure and allows you to take a real-time, IT Operations Analytics (ITOA) driven approach.

    Speaker

    Photo Speaker Name Profile
    Crispin Page Crispin Page View Profile
  • Wed 5th Oct 12:20 - 12:50
  • Let A.I. take the strain... Add to Schedule Andrew Maher  |   Avaya   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 12:20 to 12:50

    Let A.I. take the strain...

    With the growing number of what's in which you can communicate a level of automation and intelligence is becoming a baseline requirement for the majority of the busy customer relationship centres. Helping to identify and filter those interactions correctly ensures that the customer is handled in a speedy and efficient manner. The deployment of 'chatbots' and other automated capabilities are ensuring that the customer enquiry results in a positive interaction with the company.
    Andrews session will focus in on our levels of intelligence can improve and assist that customer experience delivering the quality levels that so many consumers expect today.

    Speaker

    Photo Speaker Name Profile
    Andrew Maher Andrew Maher View Profile
  • More data, devices, apps and the need for speed Add to Schedule Kieran Purdie  |   NETGEAR   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 12:20 to 12:50

    More data, devices, apps and the need for speed

    In organisations big and small, applications are increasingly becoming IT network centric. Growing amounts of wireless, voice, video, streaming, data and surveillance traffic are all contributing to performance strains. Moving into 2017 and beyond, high speed Wave 2 wireless networks alone will outpace wired connections whilst 10 Gigabit connections will migrate from large enterprise into the heart of SMB networks. Why? How? Is Wave 2 all hype? What is Multi-Gigabit switching? Who needs 10 Gigabit?

    Whether you are in start-up, growth or consolidation mode, the IT network is instrumental to future growth and survival. In this interactive session, we will engage in conversation with you about the evolving network of tomorrow and explore where priorities should be focused to get the right design, designed right.

    Speaker

    Photo Speaker Name Profile
    Kieran Purdie Kieran Purdie View Profile
  • TLS Black Ops Add to Schedule David Warburton  |   F5 Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 12:20 to 12:50

    TLS Black Ops

    The use of SSL/TLS is continuing to grow due to concerns over privacy and trust as well as the gradual adoption of new protocols such as HTTP/2 and the soon to be ratified TLS1.3. Despite all the security and performance benefits these bring encrypted traffic is also allowing malware to hide and enabling insiders to leak corporate information. This session will look to give you some advice on TLS best practises, understand some of the common (and more unique) attacks on TLS, and learn what you need to plan for to adopt the new protocols.

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Data Protection & Management for Invisible Infrastructure . Add to Schedule Tech Leaders  |  Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 12:20 to 12:50

    Data Protection & Management for Invisible Infrastructure .

    During this session you will get a good overview of the Commvault Data management suite and the seamless integration of the Nutanix Appliance.

    Speakers

    Speaker Name Profile
    Duco de Graaf View Profile
    Marc Lucas View Profile
  • How to Understand & Troubleshoot Virtualised Application Performance Add to Schedule Ian Campbell  |   Tintri   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 12:20 to 12:50

    How to Understand & Troubleshoot Virtualised Application Performance

    Application owners often struggle with performance, visibility and control when their workloads are running inside virtual machines (VMs). In this session you will learn how Tintri’s VM-aware Storage (VAS) solves these challenges.

    Speaker

    Photo Speaker Name Profile
    Ian Campbell Ian Campbell View Profile
  • Hybrid Business today and future.. Add to Schedule James Akrigg  |   Microsoft Ltd  |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 12:20 to 12:50

    Hybrid Business today and future..

    The Hybrid business is nothing new. Companies have been investing in online and physical presences for years to become more competitive. Todays advances in cloud computing are creating more opportunities for businesses to transform and become more digitally relevant. This session will look at the very latest technologies that will help change the way you work and enable you to compete in this decade of digital disruption.

    Speaker

    Photo Speaker Name Profile
    James Akrigg James Akrigg View Profile
  • Neo: Building and managing a hybrid computing platform created from best of breed cloud native vendors. Add to Schedule Paul Brunyee  |   BigTec   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 12:20 to 12:50

    Neo: Building and managing a hybrid computing platform created from best of breed cloud native vendors.

    BigTec discuss how to build and manage a hybrid computing platform created from best of breed cloud native vendors, designed to meet the current and future needs of a business, whilst empowering the IT department with the choice of how best to achieve this. Do you use on-premise or cloud based infrastructure? Or both? How do you manage this? How do you enable workload mobility? How do you operate this as a service model?

    Speaker

    Photo Speaker Name Profile
    Paul Brunyee Paul Brunyee View Profile
  • The UC Journey and the Rise of Shadow IT Add to Schedule Tech Leaders  |  Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 12:20 to 12:50

    The UC Journey and the Rise of Shadow IT

    As businesses strive to stay ahead of the market and compete there is a growing demand for employees to work more effectively and efficiently — to collaborate as teams in real-time with partners and customers.

    This presentation highlights some of the issues IT departments face, such as the increase of Shadow IT to effect UC (devices, Apps, collaboration tools) and how by changing its approach IT can help meet user needs and business demands.

    Speakers

    Photo Speaker Name Profile
    Earl Talbot Earl Talbot View Profile
    Helen Lancaster Helen Lancaster View Profile
  • PANEL: Data center scalability, resilience & compliance: what matters most and why? Add to Schedule Panel  |  Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 12:20 to 12:50

    PANEL: Data center scalability, resilience & compliance: what matters most and why?

    Most organisations see the benefits of using external data centres, but what data centre attributes matter most and why? End user organisations should join this panel to find out what data centre features they should prioritize, especially when it comes to scalability, resilience and compliance. Senior decision-makers from different end-user organisations will share their thoughts and their experience on data centre scalability, resilience and compliance.

    Join Graham Stewart, Senior Solutions Architect at Academia, Elijah Charles, Managing Director at Lypy, Tim Anker, Founder and Director at Colo-X and Jon Arnold, Managing Director at Volta Data Centres, to discuss what matters most when choosing a colocation provider.

    Speakers

    Photo Speaker Name Profile
    Elijah Charles Elijah Charles View Profile
    Graham Stewart Graham Stewart View Profile
    Jonathan Arnold Jonathan Arnold View Profile
    Nicola Hayes Nicola Hayes View Profile
    Tim Anker Tim Anker View Profile
  • Remote social engineering techniques involving every day functions Add to Schedule Neil Lines  |   Nettitude  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 12:20 to 12:50

    Remote social engineering techniques involving every day functions

    Picture yourself at work, imagine you’re in a rush, about to go to a meeting, looking up at your monitor you see a new unread email. You open the email, it’s from someone in your internal IT team. IT have installed a new SharePoint site at work and are asking people to see if they can access it? Ask yourself, do you question the authenticity of an internal email? And can even viewing a web page result in your credentials been compromised?

    This talk looks at the exploitation of every day functions such Universal Naming Convention (UNC) service via remote social engineering techniques, a devastating but commonly overlooked attack vector.

    Speaker

    Photo Speaker Name Profile
    Neil Lines Neil Lines View Profile
  • Discover hidden threats with User Behaviour Analytics (UBA) Add to Schedule Tom Salmon  |   LogRhythm   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 12:20 to 12:50

    Discover hidden threats with User Behaviour Analytics (UBA)

    Cyber criminals seek technology attack surfaces to get behind the firewall, onto the network and into your systems. However, they are equally if not more attuned to seeking vulnerabilities in users. Even if they are not acting maliciously, network users can put your business at risk simply by bypassing policies and procedures while doing their job.
     
    Users can do great damage - their abnormal behaviour is notoriously difficult to detect. So how much at risk is your business if you can't identify user threat activity?
     
    It's vital that an organisation has visibility of when a user behaves in an erratic and unusual manner to ensure any business risk can be mitigated quickly and effectively.
     
    Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:

    · An insider turns against your organisation
    · A cyber-attacker steals a user’s credentials
    · An administrator abuses account privileges
     
    Join us and see how UBA can be a powerful weapon in your Security arsenal in order to have an effective user threat detection program.

    Speaker

    Photo Speaker Name Profile
    Tom Salmon Tom Salmon View Profile
  • The Evolution of Ransomware Add to Schedule Julian Matossian  |   WatchGuard   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 12:20 to 12:50

    The Evolution of Ransomware

    Large corporations are no longer the primary target for hackers, making network security for small and midsize businesses more important than ever before. Ransomware has evolved rapidly over the last several years, but one thing remains the same: it can wreak havoc, the likes of which many businesses will never recover from.

    Speaker

    Photo Speaker Name Profile
    Julian Matossian Julian Matossian View Profile
  • All Your Data are Belong to Us; How to Stay Protected Against Ransomware Add to Schedule James Burchell  |   Sophos   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 12:20 to 12:50

    All Your Data are Belong to Us; How to Stay Protected Against Ransomware

    Ransomware has become one of the most widespread and damaging threats that Internet users face. Since the infamous Cryptolocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from home users and businesses alike.
     
    Large numbers of new infections continue to surface despite existing protective measures. How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • The Internet of Industrial Things is going to be huge, but its going to take longer than you think Add to Schedule Michael Karliner   |   ThingStudio  |   IoT

    IoT Theatre

    Wed 5th Oct 12:20 to 12:50

    The Internet of Industrial Things is going to be huge, but its going to take longer than you think

    IoT is at the peak of its hype cycle, and pundits and hopeful entrepreneurs are piling in with wild predictions and business cases. The reality, like most technology fashions, it that there is considerable underlying value, but it will not be realised instantly and will take much more effort than todays players think.

    Speaker

    Photo Speaker Name Profile
    Michael Karliner Michael Karliner View Profile
  • Incorporating unstructured data into your analytics Add to Schedule Bill Saumarez  |   Hewlett Packard Enterprise   |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 12:20 to 12:50

    Incorporating unstructured data into your analytics

    With the rise of machine data and the complex structure and often ambiguous meaning of human language, understanding unstructured data is key. During this sessions, hear some of the difficulties organisations face and learn how you can get the most out of your unstructured data by incorporating it into your big data analytics

    Speaker

    Photo Speaker Name Profile
    Bill Saumarez Bill Saumarez View Profile
  • DevOps Platform for the Evolving Enterprise Add to Schedule Eddy Pauwels  |   Clarive   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 12:20 to 12:50

    DevOps Platform for the Evolving Enterprise

    Business expects better quality releases, faster delivery and more flexibility. As a result, IT organizations are changing their application and services architectures to smaller, loosely coupled micro services. Not only do they need to change their architectures, they also need to look at changing their delivery processes. DevOps has a lot of potential, but many believe they are not ready for it yet. Learn in this session that everyone can start with DevOps today even if they are still in transition, and that business can benefit throughout the transition process.

    Speaker

    Photo Speaker Name Profile
    Eddy Pauwels Eddy Pauwels View Profile
  • Delivering Superior Business Assurance by Harnessing the Full Power of IP Intelligence Add to Schedule Ray Krug  |   NETSCOUT  |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 12:20 to 12:50

    Delivering Superior Business Assurance by Harnessing the Full Power of IP Intelligence

    IT must be able to respond to business quickly and accurately with the real-time visibility and control that is necessary for Application, Network, and UC&C Performance Management. This session will explore ‘Business’ Assurance for today’s IT teams managing the rapid and continuous deployment needs of multiple critical Business Applications including Unified Communications & Collaboration (UC&C).

    Speaker

    Photo Speaker Name Profile
    Ray Krug Ray Krug View Profile
  • PANEL: The Future of Cyber Security Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Wed 5th Oct 12:20 to 13:10

    PANEL: The Future of Cyber Security

    Is it even possible to ever be fully secure? What are the very latest attack vectors? Everyone says their technology is the solution you need – what is the true picture? To help you answer these questions and many others we have assembled what is probably the finest collection of cyber security experts in the world. This is an extraordinary opportunity to get access to the most current thinking and truly understand what the future has in store for us all.

    Chair: Rory Cellan Jones
    Panelists:
    Eugene Kaspersky, Kaspersky Labs
    James Lyne, Sophos
    Joshua Corman, Sonatype
    Rik Ferguson, Trend Micro

    Speakers

    Photo Speaker Name Profile
    Eugene Kaspersky Eugene Kaspersky View Profile
    James Lyne James Lyne View Profile
    Joshua Corman Joshua Corman View Profile
    Rik Ferguson Rik Ferguson View Profile
    Rory Cellan Jones Rory Cellan Jones View Profile
  • Wed 5th Oct 12:30 - 13:10
  • Mobile devices and their data can be compromised too. Easily [Live Hack] Add to Schedule David Parkinson  |   Check Point Software  |   Cyber Hack

    Cyber Hack Theatre

    Wed 5th Oct 12:30 to 13:10

    Mobile devices and their data can be compromised too. Easily [Live Hack]

    Understand the risks to mobile devices and how easily a simple piece of social engineering can lead to a device giving up all of its data and be fully under the control of an attacker.

    Speaker

    Photo Speaker Name Profile
    David Parkinson David Parkinson View Profile
  • Wed 5th Oct 13:00 - 13:30
  • Using Orchestration and Automation to develop next generation Data Centres and Network infrastructure. Add to Schedule Tech Leaders  |  Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 13:00 to 13:30

    Using Orchestration and Automation to develop next generation Data Centres and Network infrastructure.

    The adoption of the Internet of Things with connectivity between users and machine to machine are evolving how infrastructure and the collection of that data is controlled, managed and maintained.

    It is estimated that by 2020 up to 50Bn connected devices and people will be leveraging the next generation network environment to gain access and an insight to the data created and stored.

    Come and see how the use of Orchestration and Automation tools will assist you and us in the planning, deployment and optimising the next generation hybrid network environment.

    Speakers

    Photo Speaker Name Profile
    Daniel Hearty Daniel Hearty View Profile
    Richard Haddock Richard Haddock View Profile
  • Cloud-Managed Mobility with Meraki Wireless and EMM Add to Schedule Emily Sporl  |   Cisco Meraki   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 13:00 to 13:30

    Cloud-Managed Mobility with Meraki Wireless and EMM

    This session will demonstrate Cisco Meraki's unique Cloud architecture, and a deep-dive into an entire wireless solution and deployment, including the latest 802.11ac offering and complete BYOD/Guest solutions. The presenter will provide live demonstrations and deployment strategies for key features including client fingerprinting, layer 7 traffic shaping, location services, and integrated EMM.

    Speaker

    Photo Speaker Name Profile
    Emily Sporl Emily Sporl View Profile
  • Are you prepared for Ransomware? Add to Schedule Carl Leonard  |   Forcepoint   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 13:00 to 13:30

    Are you prepared for Ransomware?

    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware.

    Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims.

    Join Carl Leonard, Principal Security Analyst at Forcepoint, as he examines the technical and business threats that ransomware continues to pose.

    Speaker

    Photo Speaker Name Profile
    Carl Leonard Carl Leonard View Profile
  • Using Artificial Intelligence with Web Application Firewalls to ease the burden on the cyber skills gap Add to Schedule Laurent Gil  |   ZENEDGE   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 13:00 to 13:30

    Using Artificial Intelligence with Web Application Firewalls to ease the burden on the cyber skills gap

    Cyber criminals are increasingly looking to exploit weaknesses and vulnerabilities in websites and web applications as a means to disrupt operations, through DDoS attacks; or to compromise sensitive data held in the web applications or in connected systems.

    A new generation of Artificial Intelligence-powered WAF solutions seek to ease the burden on scarce IT Security resources by using advanced algorithms to automate the tuning and on-going protection of web application security.

    Join Laurent Gil from Zenedge for this informative presentation to see how Zenedge is helping companies of all sizes to use AI technologies to automate web application security.

    Speaker

    Photo Speaker Name Profile
    Laurent Gil Laurent Gil View Profile
  • Application Virtualisation – Managing Increasing System Complexity While Delivering Faster Add to Schedule Matthew Brady  |   Hewlett Packard Enterprise  |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 13:00 to 13:30

    Application Virtualisation – Managing Increasing System Complexity While Delivering Faster

    Applications are becoming increasingly interconnected, with the average consumer system having more than 30 integrations. In addition, the drive to increased security using biometric information, combined with environmental, geo-location and other sensor data on portable devices often integral to a cross-platform user experience is increasing the complexity of application infrastructure and test requirements. Managing application delivery in platform silos no longer matches patterns of interaction, with users now frequently transitioning between web, mobile web, app and back again seamlessly.

    Speaker

    Photo Speaker Name Profile
    Matthew Brady Matthew Brady View Profile
  • Why applications are key to Hybrid Cloud Add to Schedule Adam Richardson  |   Hewlett Packard Enterprise   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 13:00 to 13:30

    Why applications are key to Hybrid Cloud

    We often get focussed on the intricacies of infrastructure when we talk about hybrid cloud, instead we need to focus on the application. Join this session to hear how by focussing on the application architecture and delivery methods you can simplify the approach hybrid delivery as well as speed up innovation and improve availability of services to end customers.

    Speaker

    Photo Speaker Name Profile
    Adam Richardson Adam Richardson View Profile
  • Who will be the next Mossack Fonseca? The insider security threat. Add to Schedule Dr Mary Haigh   |   BAE Systems Applied Intelligence   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 13:00 to 13:30

    Who will be the next Mossack Fonseca? The insider security threat.

    Identifying insider threats before they happen is hard. Although many detection approaches have been tried, they are generally onerous to manage and impede legitimate business. BAE Systems has developed cutting edge analytics, including predictive and machine learning techniques, to discover the threats and areas of risk most likely to impact business and explore what you can do to defend against them and mitigate the impact.

    Speaker

    Photo Speaker Name Profile
    Dr Mary Haigh Dr Mary Haigh View Profile
  • The Four Keys to Locking Cloud Security Add to Schedule Tom Patterson  |   Unisys  |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 13:00 to 13:30

    The Four Keys to Locking Cloud Security

    Come to see Tom Patterson, Unisys’ Chief Trust Officer at the Future of Threat Intelligence theatre and learn about the four secret keys to locking and securing your cloud security. This engaging session is all about learning! Learn how to extend your identities, keep those keys safe, segment your processes and automate your transfers - all from one of the most renowned, sort after security speakers around.

    Speaker

    Photo Speaker Name Profile
    Tom Patterson Tom Patterson View Profile
  • Is your Data Contaminated? How do you know? Add to Schedule Jeff Harris  |   Ixia   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 13:00 to 13:30

    Is your Data Contaminated? How do you know?

    Once you connect a data source to a network tool it is natural to assume you will see all the data from that connection source. Just like when you fill a glass of water from your sink, you rarely consider whether it is safe to drink. Most do not even bother checking, but between high traffic volumes and larger numbers of connections, what if data was being lost during data distribution? Would you even know? How can you look beyond the spec sheet of your visibility infrastructure and know its limitations?

    Speaker

    Photo Speaker Name Profile
    Jeff Harris Jeff Harris View Profile
  • A New Way to Store, Protect and Access Unlimited File Data Add to Schedule David Ranson  |   Nasuni   |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 13:00 to 13:30

    A New Way to Store, Protect and Access Unlimited File Data

    Today’s companies are drowning in unstructured data, but the tangled layers of technology used to store, protect, access and manage files lead to a complex, expensive environment. Join us to learn about a new model that combines the value and reach of the cloud with the power of local security and performance. Find out how a single global file management system can eliminate the costly solutions associated with the traditional storage stack and still deliver unlimited scalability, built-in data protection and fast, secure file access to users everywhere – even on mobile devices.

    Speaker

    Photo Speaker Name Profile
    David Ranson David Ranson View Profile
  • ChatOps: A Smoother Transition to Continuous Delivery Add to Schedule Brent Beer  |   GitHub   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 13:00 to 13:30

    ChatOps: A Smoother Transition to Continuous Delivery

    Have you been told that your company is moving towards continuous delivery culture, but you have no idea what that really means? Everyone wants to run a more productive and agile engineering team by balancing the competing priorities of continuous delivery while maintaining a stable system. Continuous delivery is a practice that everyone is either wishing they had, talking about setting up, or getting ready to implement. But how does your company chat client fit into this and how can it help speed things up?

    In this talk we'll look at ChatOps and how it can bring continuous delivery to developers' fingertips for everyone's benefit. We'll also see what other tools can plug into a chat client to optimize development workflows, and what immediate results we can expect to see as we start implementing integrations. By the end of this session, we will have outlined clear steps to ship code faster and safer today.

    Speaker

    Photo Speaker Name Profile
    Brent Beer Brent Beer View Profile
  • How Architects can Recover, Manage, and Secure Data in the Enterprise Cloud Add to Schedule Chris Wahl  |   Rubrik   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 13:00 to 13:30

    How Architects can Recover, Manage, and Secure Data in the Enterprise Cloud

    The blazing pace of innovation in the enterprise data center has impacted how applications are delivered by the enterprise. As businesses continue to build smaller and more complex services across a global footprint, the ability to protect, manage, and secure data with traditional solutions are simply unequipped to move into the cloud world. What’s needed is a new approach to providing data protection. One that natively talks RESTful APIs and is weaved together using a fabric of smart, distributed services and is built by engineers who have lead web-scale design before the term was even coined.

    In this session, join Chris Wahl, Chief Technical Evangelist at Rubrik, as he talks about the challenges facing the modern architect embarking on a journey to the enterprise cloud. Learn how it’s possible to sweep the floor of complex and piecemeal data protection solutions by using a scale-out software fabric across on-premises and cloud environments. See Rubrik’s Cloud Data Management stack in action as smart policies, not jobs, are applied to a hierarchy workloads and applications to recover, manage, and secure your data. Everywhere.

    Speaker

    Photo Speaker Name Profile
    Chris Wahl Chris Wahl View Profile
  • Delivering carbon neutral co-location solutions at 30% less cost Add to Schedule Petter Tømmeraas  |   Green Mountain   |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 13:00 to 13:30

    Delivering carbon neutral co-location solutions at 30% less cost

    There are several reasons why Norway is an ideal location for data centers, but cost effective power generation remains one of the biggest drawing factors. Norway has a surplus of renewable hydro power that is available at a very low cost. The average cost per KWh has consistently been around 4.5 euro cents (equivalent to £0.04). The price will decrease by a further 30% as a result of the Norwegian government abolishing the power tax for big green data centers such as ours.

    Speaker

    Photo Speaker Name Profile
    Petter Tømmeraas Petter Tømmeraas View Profile
  • Wed 5th Oct 13:20 - 14:10
  • PANEL: The Future of Cloud Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Wed 5th Oct 13:20 to 14:10

    PANEL: The Future of Cloud

    Cloud computing forms at least part of almost everyone’s technology plans but what next? We have assembled an incredible panel of some of the world’s finest minds on cloud to help you understand what is coming next from the major vendors, the innovation coming through the start-up space and how your organisation should really be harnessing the mind boggling array of technologies now at your fingertips?  The objective is for you to leave this session with a clear roadmap from the very people shaping the cloud.
     

    Chair: Glen Robinson, Leading Edge Forum
    Panelists:
    Mark Russinovich, Microsoft Azure
    Matt McNeill, Google
    Colin Humphreys, Pivotal
    Dr Jon Machtynger, IBM

    Speakers

    Photo Speaker Name Profile
    Colin Humphreys Colin Humphreys View Profile
    Dr Jon Machtynger Dr Jon Machtynger View Profile
    Glen Robinson Glen Robinson View Profile
    Mark Russinovich Mark Russinovich View Profile
    Matt McNeill Matt McNeill View Profile
  • Holding your office and home to ransom [Live Hack] Add to Schedule Ken Munro  |   Pen Test Partners LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 13:20 to 14:10

    Holding your office and home to ransom [Live Hack]

    In this session you’ll see live demonstrations showing how even the simplest of things like a coffee machine (and other gadgets) are the new way to get your network hijacked. As smart appliances and devices grow in popularity we’ll explain in clear and compelling terms how they are the future routes to holding your business to ransom.
     
    It’s not all a horror story though, we’ll also be providing plenty of practical advice from evaluating devices to showing how they can be built, managed, and implemented securely.

    Speaker

    Photo Speaker Name Profile
    Ken Munro Ken Munro View Profile
  • Wed 5th Oct 13:40 - 14:10
  • High-Speed PoE Solutions: Facilitating Wave 2 802.11ac Infrastructure Upgrades Add to Schedule Galit Mendelson  |   Microsemi   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 13:40 to 14:10

    High-Speed PoE Solutions: Facilitating Wave 2 802.11ac Infrastructure Upgrades

    Proliferation of bandwidth-hungry Wi-Fi devices drives the need to deploy IEEE 802.11ac Wave 2 Wi-Fi infrastructure, which requires bandwidth exceeding 1Gigabit/s. Today, over 74% of Enterprise cabling is Cat 5e/6, therefore unfit for 10GBASE-T, the old “next step” in Ethernet. With costs of $200-$800 to upgrade a cable in mind, the NBASE-T alliance created 2.5G Ethernet specifications to maximize the available bandwidth of existing cable installations. Microsemi, the Pioneer in Power over Ethernet, introduces innovative Multigigabit NBASE-T products to enable deploying 2.5G IEEE 802.11ac Wave 2 infrastructure without replacing neither the existing 1000Base-T switches, nor the Cat5e/6 cabling.

    Speaker

    Photo Speaker Name Profile
    Galit Mendelson Galit Mendelson View Profile
  • Why Executives Should Think Like Hackers Add to Schedule Gareth O'Sullivan  |   WhiteHat Security   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 13:40 to 14:10

    Why Executives Should Think Like Hackers

    Businesses have begun to realize that accountability for web site hacks cannot rest solely with the IT Security function and that preventing such attacks requires commitment from both business and technical executives. Gareth O’Sullivan explains Why Executives Should Think Like Hackers, providing an inside view of how hackers go about targeting critical web assets. He explains how to assess your organisation’s risk exposure and evaluate whether traditional security tools and testing are enough to protect against today’s advanced, ever-changing hacking techniques.

    Speaker

    Photo Speaker Name Profile
    Gareth O'Sullivan Gareth O'Sullivan View Profile
  • Cryptolocker - LIVE Add to Schedule James Mason  |   Datto   |   Backup & Availability

    Backup & Availability Theatre

    Wed 5th Oct 13:40 to 14:10

    Cryptolocker - LIVE

    CryptoLocker is a ransomware trojan, created by hackers, whose business model is based on hijacking computers and extorting money from users. As CryptoLocker continues to impact businesses more and more everyday, how do you avoid this from happening to you?

    Come see James Mason infect his device with the latest version of CryptoLocker and then see LIVE how fast Datto recover your data!

    Speaker

    Photo Speaker Name Profile
    James Mason James Mason View Profile
  • Buying and Implementing an All Flash Array… Where Do I Begin? Add to Schedule Tom O'Neill  |   Kaminario   |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 13:40 to 14:10

    Buying and Implementing an All Flash Array… Where Do I Begin?

    Before the advent of flash storage, disk array technology was relatively mature and slow to develop. Customers typically had a five-year plan for their technology investments. But as All Flash Arrays take over the on-premise data centre, customers are finding that they cannot even plan for the next 12 months. In this session we will look at how to plan for the future while transforming the workloads of today, taking advantage of the new possibilities unleashed by flash storage: agility, performance and unprecedented scale.

    Speaker

    Photo Speaker Name Profile
    Tom O'Neill Tom O'Neill View Profile
  • Solving the Challenges of Unified Monitoring of Hybrid Cloud & Network Infrastructure Add to Schedule Rajib Rashid  |   Kaseya   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 13:40 to 14:10

    Solving the Challenges of Unified Monitoring of Hybrid Cloud & Network Infrastructure

    Data center complexity – combined with the increased demand for IT service assurance by business owners – requires a new way to manage the data center. Monitoring servers, networks and application in older-generation siloed products results in great difficulties and long delays when trying to determine the root cause of any downtime or performance degradation. Companies can no longer afford these delays.

    Attend this session to understand how Kaseya Traverse delivers advanced network monitoring for even the most complex data centers. Traverse allows nimble, efficient IT systems management by providing a service-oriented view of the data center.

    Speaker

    Photo Speaker Name Profile
    Rajib Rashid Rajib Rashid View Profile
  • The 4th Era of IT Infrastructure: Beyond Hyperconverged to Superconverged Systems Add to Schedule Dr. Jai Menon  |   Cloudistics   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 13:40 to 14:10

    The 4th Era of IT Infrastructure: Beyond Hyperconverged to Superconverged Systems

    Hear about the emerging 4th generation of IT infrastructures that comes after hyperconverged -- called superconverged. Superconverged systems combine the best of converged and hyperconverged systems, while providing new capabilities beyond what either provides. They make it extremely easy for customers to consume IT and meet all of their performance, resiliency, and cost objectives. Join our session to learn how Cloudistics Chief Scientist and IBM Fellow Emeritus, Jai Menon, views superconverged systems, and how it meets the IT infrastructure requirements of today.

    Speaker

    Photo Speaker Name Profile
    Dr. Jai Menon Dr. Jai Menon View Profile
  • Know the Truth About Your Migration to Cloud Telephony and Skype for Business Add to Schedule Rami Houbby  |   NFON   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 13:40 to 14:10

    Know the Truth About Your Migration to Cloud Telephony and Skype for Business

    The enduring dominance of Microsoft has enabled millions of organisations to embrace the benefits of Unified Communications within that familiar environment: Skype for Business.
    Skype for Business is a powerful and compelling platform, but it has an Achilles’ Heel: it can’t displace your expensive investment in a proper enterprise phone system. It does voice, to a point, but is not capable of basic telephony features businesses expect from a PBX – at least not without the considerable costs, overheads and risks that come with integration.
    Learn the truth about what you can really do with Skype for Business if you’ve got seamless, out-of-the-box cloud integration.

    Speaker

    Photo Speaker Name Profile
    Rami Houbby Rami Houbby View Profile
  • Data Centre to digital classroom Add to Schedule Robin Brown  |   Colt Data Centre Services   |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 13:40 to 14:10

    Data Centre to digital classroom

    Meta trends affecting the DC industry

    Speaker

    Photo Speaker Name Profile
    Robin Brown Robin Brown View Profile
  • Dude.... where's my data! Add to Schedule Chris Kiaie  |   Oriium   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 13:40 to 14:10

    Dude.... where's my data!

    Chris will discuss the trends from legacy hardware, virtualisation and convergence, and the opportunities of public cloud and elastic computing. This will cover the need for organisations to be aware of critical data dispersed across the likes of Office 365, Dropbox, Box, Google & Salesforce.com, as well as the increasing challenge for IT of enabling employee productivity while remaining compliant and protecting IP and client data.

    Speaker

    Photo Speaker Name Profile
    Chris Kiaie Chris Kiaie View Profile
  • Secure Your Network from the Core Add to Schedule Malcolm Murphy  |   Infoblox   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 13:40 to 14:10

    Secure Your Network from the Core

    The most common service targeted by application layer attacks is DNS. As well as being a target in its own right, DNS is also exploited to infect devices, propagate malware, and steal data from organisations just like yours. Intruders view DNS as a weak link because it’s often not considered by existing security solutions.

    We will show how you can secure your DNS infrastructure to protect you against these attacks and exploits. But that’s not all: by making DNS data an integral part of your security posture you can enrich your existing security infrastructure, adding context that enables you to make better decisions about which security alerts to prioritize. And that rich information also means that you will be more efficient in re-mediating the incident.

    Speaker

    Photo Speaker Name Profile
    Malcolm Murphy Malcolm Murphy View Profile
  • Security Intelligence – Your Competitive Advantage Add to Schedule Matthias Maier  |   Splunk, Inc.   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 13:40 to 14:10

    Security Intelligence – Your Competitive Advantage

    Today’s enterprise need to obtain security intelligence to combat advanced threats and changing business demands. Simple implementation of perimeter and endpoint protection is no longer enough. Security Managers need broader insights across IT, the business and upcoming cloud applications.

    Speaker

    Photo Speaker Name Profile
    Matthias Maier Matthias Maier View Profile
  • Orchestrating the digital workplace Add to Schedule Tech Leaders  |  Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 13:40 to 14:10

    Orchestrating the digital workplace

    It’s happening. Even though your content may be on premise, your employees are using cloud apps to work and collaborate with external partners and customers, creating their very own digital workplace to optimize productivity. But how do you embrace that end user freedom while protecting your corporate intellectual property? Hear from Marc Parnell, Chief Information Officer, from Zone Digital, BIMA AGENCY OF THE YEAR 2016, on how they are shaping the future digital workplace of their employees and clients.

    Speakers

    Photo Speaker Name Profile
    Marc Parnell Marc Parnell View Profile
    Rajesh Ram Rajesh Ram View Profile
  • Extreme data analytics: How to analyse vast amounts of data fast and effectively Add to Schedule Michael Flower  |   Hewlett Packard Enterprise   |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 13:40 to 14:10

    Extreme data analytics: How to analyse vast amounts of data fast and effectively

    With the vast amounts of data now available, one of the biggest challenges organisations face is being able to extract data and analyse it fast and effectively. Attend this session to hear how companies are using the latest technology to overcome these challenges and using this data to support their businesses.

    Speaker

    Photo Speaker Name Profile
    Michael Flower Michael Flower View Profile
  • Continuous Delivery: DevOps Holy Grail Add to Schedule Chad Armitstead  |   Puppet   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 13:40 to 14:10

    Continuous Delivery: DevOps Holy Grail

    4:30 pm, Friday. The CTO says “please deploy the latest version to production.” Look around. Who’s relaxing with a beer, who’s sweating, who’s closing their laptop and backing slowly out the door? What you see is how continuous your delivery is.

    Almost every company wants what CD promises: faster time to market, higher quality, lower costs, better products and happier teams. Some organizations have achieved a fully automated CD pipeline. For others, CD remains an elusive holy grail.

    What is continuous delivery? How is it different from continuous deployment and continuous integration? Why is it so hard to achieve?

    In this talk, we’ll discuss what continuous delivery is, its components and how to start building a culture that can make it happen.

    Speaker

    Photo Speaker Name Profile
    Chad Armitstead Chad Armitstead View Profile
  • Smart Thinking For Next Generation Data Centre Resiliency Add to Schedule Derek Watkins  |   Opengear   |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 13:40 to 14:10

    Smart Thinking For Next Generation Data Centre Resiliency

    The data centre is getting faster, denser and more complex. Opengear’s Derek Watkins, VP EMEA, examines how new smart technologies can help meet the demands of the transition while building new levels of resiliency. The cloud revolution and other trends such as Software Defined Networking (SDN) and the Internet of Everything (IoE) have had a dramatic impact on the data centre landscape. The demand for centrally managed IT capacity has led to worldwide data centre space expected to grow from 1.58 billion square feet in 2013 to 1.94 billion square feet by 2018 according to IDC.

    Speaker

    Photo Speaker Name Profile
    Derek Watkins Derek Watkins View Profile
  • Hyperconvergence with Data Virtualisation – A Double Win Add to Schedule Paul Hargreaves  |   SimpliVity   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 13:40 to 14:10

    Hyperconvergence with Data Virtualisation – A Double Win

    Why is Data Virtualisation such a big win when building or buying a hyperconverged platform?

    Understand the workings and impact of Data Virtualisation in HCI boosting the efficiency of a hyperconverged platform vs simply collapsing down number of physical devices in enterprise infrastructure. Learn how this translates to reduced hardware requirements, simplified management and reduced overhead for traditionally “heavy lifting” tasks.

    Speaker

    Speaker Name Profile
    Paul Hargreaves View Profile
  • Breaking the Attack Chain Add to Schedule Justin Dolly  |   Malwarebytes   |   Cyber Hack

    Cyber Hack Theatre

    Wed 5th Oct 13:40 to 14:40

    Breaking the Attack Chain

    There are many attack vectors by which a hacker can gain access to a computer’s network to exploit system’s vulnerabilities – drive by downloads, social engineering and exploits to name but a few. Attend this presentation to see these threat vectors in action and to see how Malwarebytes adds value at each layer of the attack chain.

    Speaker

    Photo Speaker Name Profile
    Justin Dolly Justin Dolly View Profile
  • Wed 5th Oct 14:20 - 14:50
  • Amazon Web Services Cloud, an introduction to your innovation platform Add to Schedule Gavin Jackson  |   Amazon Web Services  |   Keynote

    Keynote Theatre

    Wed 5th Oct 14:20 to 14:50

    Amazon Web Services Cloud, an introduction to your innovation platform

    Join Gavin Jackson, Managing Director UK & Ireland at AWS, for this introduction to the AWS Cloud. Learn how organisations from the smallest startup to the largest multinationals are adopting AWS to enable them to transform their businesses through access to the innovative, low cost and secure cloud services that AWS provides.

    Speaker

    Photo Speaker Name Profile
    Gavin Jackson Gavin Jackson View Profile
  • Cyber Security Myths and Monsters: how to raise awareness and change behaviours Add to Schedule Dr Jessica Barker  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 14:20 to 14:50

    Cyber Security Myths and Monsters: how to raise awareness and change behaviours

    Cyber insecurity often feels like a horror story, and the idea of cyber security an out-of-reach myth. The last few years have seen breaches that are bigger, and of a higher profile, than ever before. When we trace these back to their cause, we often find that attackers took advantage of human behaviour, via social engineering, poor password management, gaps in physical security or malicious insiders. Combining sociological and psychological research with mythology and classic horror fiction, this talk highlights what people needs to know, and how we should be telling them, to make cyber security less of a monster.

    Speaker

    Photo Speaker Name Profile
    Dr Jessica Barker Dr Jessica Barker View Profile
  • Security for a Cloudy Day Add to Schedule David Maclean  |   F5 Networks   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 14:20 to 14:50

    Security for a Cloudy Day

    Today’s Data Centre has evolved to form a delivery platform on which applications accessed by customers, enterprise users and unfortunately attackers are now hosted outside of the traditional perimeter. How do businesses continue to be agile and grow by enabling access to these applications from anywhere, on any device whilst still securing against the emergence of modern day threats against them and their customers? In this session we take a look at the security services available to deliver secured applications hosted in the public cloud, private cloud and on premises.

    Speaker

    Photo Speaker Name Profile
    David Maclean David Maclean View Profile
  • Wi-Fi and Cloud: A Pairing Worth the Wait Add to Schedule Steve Johnson  |   Ruckus Wireless   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 14:20 to 14:50

    Wi-Fi and Cloud: A Pairing Worth the Wait

    As digitally savvy consumers continue to demand more seamless wireless connectivity, companies and carriers are searching for simple wireless technology deployment with less time-intensive network architectures.
     
    In light of this market demand, according to IDC, the WLAN market experienced substantial growth in the first quarter of 2016. This is a trend that they expect to continue, in part due to increased demand for the well-established benefits of cloud-managed WLAN services. Steve Johnson, Regional Director, Northern Europe at Ruckus Wireless discusses how cloud Wi-Fi and WLAN Management-as-a-Service creates unparalleled high performance access points (APs) with the public cloud for simple set-up and management without compromising on Wi-Fi performance for enterprises, small and large, at any scale.
     
    Learn how cloud Wi-Fi maximises efficiency by configuring and managing the network from anywhere, enabling network managers to benefit from cloud simplicity without having to compromise on Wi-Fi performance. Ruckus Wireless believes customers shouldn’t have to sacrifice end user experience in order to reap the benefits of the cloud.

    Speaker

    Photo Speaker Name Profile
    Steve Johnson Steve Johnson View Profile
  • How do you spot the insider threat? Add to Schedule John Hughes  |   Varonis UK   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 14:20 to 14:50

    How do you spot the insider threat?

    Insiders are the new malware. Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials.
     
    2015 was a remarkable year for insider threats. It’s estimated that the average organisation suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach. In order to combat the insider threat, organisations need to shift their focus from the perimeter to their data itself.
     
    Organisations have to face the new reality that it is not a matter of if they will be breached, but when they will be breached. Attackers are already inside – either rightfully as an employee or contractor, or through legitimate but compromised credentials as an outside hacker. Their presence on a network wouldn’t necessarily look suspicious to IT, but their activity would likely appear anomalous. Still, users’ behaviour on many internal systems is rarely monitored or analysed.

    This session will review a User Behaviour Analytics methodology for connecting disparate sets of data to detect signs of a breach, arrest the actions, and recover from the incident.

    Speaker

    Speaker Name Profile
    John Hughes View Profile
  • Delivering Mobile Workforce Productivity at the Edge and Business Assurance at the Core Add to Schedule Louis Vieille-Cessay  |   Hewlett Packard Enterprise  |   Backup & Availability

    Backup & Availability Theatre

    Wed 5th Oct 14:20 to 14:50

    Delivering Mobile Workforce Productivity at the Edge and Business Assurance at the Core

    Organizations need an endpoint protection solution that delivers business assurance with corporate intelligence, control, security, and information analytics without compromising end-user productivity or conveniences. During this session learn how you can address some of the key challenges when considering endpoint back up and how you can use a secure cloud based endpoint data protection solution to continuously protect information generated by an increasingly mobile workforce.

    Speaker

    Photo Speaker Name Profile
    Louis Vieille-Cessay Louis Vieille-Cessay View Profile
  • Leveraging Flash Storage to Accelerate your Cloud Journey Add to Schedule Alex D'Anna  |   Pure Storage   |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 14:20 to 14:50

    Leveraging Flash Storage to Accelerate your Cloud Journey

    IT departments around the world are being transformed by the adoption of cloud models while simultaneously embracing the benefits of solid-state storage. This session will explore how these two trends interact to provide Organizations with a foundation for an ultra-reliable, secure IT infrastructure whilst improving operational performance, resiliency and efficiency.

    Speaker

    Speaker Name Profile
    Alex D'Anna View Profile
  • How to achieve and sustain the ultimate desktop and application user experience Add to Schedule David Taylor  |   Lakeside Software   |   Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 14:20 to 14:50

    How to achieve and sustain the ultimate desktop and application user experience

    What quality of user experience is your PC or virtual desktop delivering to your users? Can you measure real time how much their productivity is being impacted and quickly identify the root cause? What is best practice when planning and executing a desktop transformation project? Are you struggling to drive down the cost of delivering desktop services?

    Join this session to learn best practice for achieving and managing the ultimate user experience at the lowest TCO. Find out how Lakeside SysTrack enables PC and Citrix experts achieve all this and more.

    Speaker

    Photo Speaker Name Profile
    David Taylor David Taylor View Profile
  • Availability outside the Datacenter Add to Schedule Michael Cade  |   Veeam Software UK Ltd  |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 14:20 to 14:50

    Availability outside the Datacenter

    Veeam Availability Platform for the Hybrid Cloud is the focus for this session, taking the proven technologies of Veeam for the On-Premises datacenter and bringing the availability message into Managed Cloud and Public Cloud. This session will cover backup and recovery of Cloud Instances, the ability to backup and restore your Microsoft Office 365 mail and updates on the Veeam Cloud Connect offerings for Managed Cloud providers. Join this session to learn more about:
    * Veeam Agents for Public Cloud and Physical Workloads
    * NEW Veeam ® Backup for Microsoft Office 365 - mitigate the risk of losing access to your email data and ensure Availability to your users.
    * Veeam Cloud Connect - an overview of Managed Cloud with VCSPs.
    * Direct Restore to Microsoft Azure – Migrating workloads to the cloud.

    Speaker

    Photo Speaker Name Profile
    Michael Cade Michael Cade View Profile
  • Women in IT Add to Schedule Toni Collis  |   EPPC  |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 14:20 to 14:50

    Women in IT

    Improving diversity in IT
    It is now taken for granted that diverse teams improve performance and productivity, however, improving diversity and promoting equality as important principles is challenging.

    Speaker

    Photo Speaker Name Profile
    Toni Collis Toni Collis View Profile
  • The Best Path to Mobile Unified Communications and Collaboration Add to Schedule Tech Leaders  |  Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 14:20 to 14:50

    The Best Path to Mobile Unified Communications and Collaboration

    As more and more workers rely on smartphones and tablets for their day-to-day work, find out how unified communications is evolving to be more social, to work the way distributed teams work and better support service and information workers.

    Learn too how unified collaboration is enabling many to many conversations, collaboration and project management.

    Looking ahead, how can VoLTE help us deliver native enterprise voice and communication-enabled industry specific applications on mobile devices?

    Speakers

    Photo Speaker Name Profile
    Ian Bevington Ian Bevington View Profile
    John Wright John Wright View Profile
  • Datacenter evolution and disruption Add to Schedule Andrew Donoghue  |   451 Research  |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 14:20 to 14:50

    Datacenter evolution and disruption

    Andrew Donoghue, European Research Manager, Datacenter Technologies, 451 Research, will provide an overview of the key technologies and trends shaping the design and operation of datacenters from cloud to IoT.

    Speaker

    Photo Speaker Name Profile
    Andrew Donoghue Andrew Donoghue View Profile
  • Beyond Files: The Full Spectrum of Attacks Add to Schedule Eran Ashkenazi  |   SentinelOne  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 14:20 to 14:50

    Beyond Files: The Full Spectrum of Attacks

    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Advanced Threat Protection Add to Schedule Steve Mulhearn  |   Fortinet   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 14:20 to 14:50

    Advanced Threat Protection

    As enterprises struggle to fend off the barrage of cyber attacks it’s obvious that their security strategy from the past is no longer effective. Lack of technology, mismatched products from different vendors, and disparate sources of threat intelligence (if any) are leaving too many gaps in their network’s security infrastructure, gaps that are being exploited by the cyber criminal and hacker communities. This presentation will introduce a strategy to close off those gaps – multiple technologies working together across multiple attack surfaces to provide a multi-layer defense that is both proactive and reactive and supported by real time threat intelligence.

    Speaker

    Photo Speaker Name Profile
    Steve Mulhearn Steve Mulhearn View Profile
  • When Big Data meets Small Things – Secure Event Delivery for the Internet of Things” Add to Schedule Jeff Sanderson  |   Citrix Systems UK Ltd   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 14:20 to 14:50

    When Big Data meets Small Things – Secure Event Delivery for the Internet of Things”

    Protecting the network all the way from devices to the cloud is a new kind of networking challenge; massive scale, low-power devices, and different attacks to fight off.

    Find out how to architect your network end-to-end with gateways that deal with these new protocols and standards

    Speaker

    Photo Speaker Name Profile
    Jeff Sanderson Jeff Sanderson View Profile
  • SIM. Without the card Add to Schedule Dejan Rasuo   |   Spirent Communications  |   IoT

    IoT Theatre

    Wed 5th Oct 14:20 to 14:50

    SIM. Without the card

    The presentation will cover the current state of affairs of the SIM industry, it will challenge assumptions on its relevance to the (in) ability to scale IOT as well as the options of de-coupling the eSIM operating system & relevant hardware to augment the current value chain, eco-system and legacy business models towards greater market reach and on demand connectivity activation. It will show how the value chain is changing and how the ‘customers of old’ are becoming the ‘competition of new’.

    Speaker

    Photo Speaker Name Profile
    Dejan Rasuo                                                                         Dejan Rasuo View Profile
  • Unlock the Insights Hidden in Your Network Add to Schedule Idjiwa Adjido  |   ExtraHop Networks  |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 14:20 to 14:50

    Unlock the Insights Hidden in Your Network

    Most enterprises look at their network as simply a means of transport, but it actually contains a wealth of real-time application and business insights. You can tap into this rich mine of information with wire data analytics, a new technology that is built for the growing scale of modern datacenters. Attend this session to learn how wire data can equip your Operations, Application, InfoSec, and Business teams.

    Speaker

    Photo Speaker Name Profile
    Idjiwa Adjido Idjiwa Adjido View Profile
  • Scaling up DevOps in the Enterprise Add to Schedule Benjamin Wootton  |   Contino   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 14:20 to 14:50

    Scaling up DevOps in the Enterprise

    A large number of organisations have successfully adopted DevOps practices, but is it for everyone? Surely bigger enterprises can’t do this because they are too big and too siloed to make it work. Or can they? I will walk through the biggest challenges in scaling up DevOps in the Enterprise and how to approach them.

    Speaker

    Photo Speaker Name Profile
    Benjamin Wootton Benjamin Wootton View Profile
  • Strategic and Tactical Approaches to Monitoring Add to Schedule Michael Kulchisky  |   AdRem Software   |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 14:20 to 14:50

    Strategic and Tactical Approaches to Monitoring

    This session will discuss elements of proper monitoring, discuss common monitoring pitfalls, and tuning vital Performance monitoring and Event Generation systems to meet business needs.

    Speaker

    Photo Speaker Name Profile
    Michael Kulchisky Michael Kulchisky View Profile
  • The Enterprise Immune System: A Shift to Self-Detecting and Self-Defending Digital Businesses Add to Schedule
    Dave Palmer  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 14:20 to 14:50

    The Enterprise Immune System: A Shift to Self-Detecting and Self-Defending Digital Businesses

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defence is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organisation. By analysing every network, device, and user, and modelling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behaviour. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defence, is relied upon by organisations around the world, and can cover up to millions of devices.

    Speaker

    Speaker Name Profile
    Dave Palmer View Profile
  • Wed 5th Oct 15:00 - 15:30
  • Embracing the power of the enterprise cloud Add to Schedule Sunil Potti  |   Nutanix  |   Keynote

    Keynote Theatre

    Wed 5th Oct 15:00 to 15:30

    Embracing the power of the enterprise cloud

    Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy datacenter infrastructure built upon of standalone storage.

    This session will tackle traditional workloads, deploy new scale-out applications, simply operations, reduce costs and make your datacenter infrastructure invisible by embracing these disruptive new technologies.

    The talk will also cover performance and availability best practices for storage, networking, and compute/virtualization for high performance databases and applications, and server workloads and explore a few examples of production deployments on HCI.

    Speaker

    Photo Speaker Name Profile
    Sunil Potti Sunil Potti View Profile
  • Where Bits & Bytes Meet Flesh & Blood: DevOps, CyberSafety, and the Internet of Things Add to Schedule Joshua Corman  |   Sonatype  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 15:00 to 15:30

    Where Bits & Bytes Meet Flesh & Blood: DevOps, CyberSafety, and the Internet of Things

    We've heard software is eating the world; software is infecting the world. Our dependence on connected technology is growing faster than our ability to secure it - in areas affecting public safety and human life. Adding millions of lines of code and connecting everything to everything else exposes cyber physical systems to new accidents and adversaries. This is truly where bits & bytes meet flesh & blood. While many in security fear DevOps and see it as the end of security as we know it... maybe that's a good thing. Our best is not good enough. Despite best practices, modern SW and Security have allowed 100 of the F100 to lose IP and sensitive information - even our governments routinely succumb to adversaries. These failure rates cannot stand with the consequences of failure being measured - not in record count - but in human lives and GDP. Paradoxically, it may take DevOps to rise to these challenges. Rugged DevOps is finding un-obvious common ground and break throughs like SW supply chain principles, greater visibility and response agility, immutable infrastructure, and the like. We must be better. This is what better looks like.

    Speaker

    Photo Speaker Name Profile
    Joshua Corman Joshua Corman View Profile
  • Not All SD-WANS Are Equal – Why Performance Matters Add to Schedule Simon Pamplin  |   Silver Peak   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 15:00 to 15:30

    Not All SD-WANS Are Equal – Why Performance Matters

    The data centre is becoming increasingly ruled by software. Indeed, software-defined storage (SDS), software-defined networks (SDN), virtual machines (VM), and network function virtualization (NFV) are all changing the way technology is deployed. In this session, Simon will review the software defined landscape, paying close attention to the software-defined WAN (SD-WAN) and how it can lower costs, reduce deployment times and create a much more flexible infrastructure. Importantly, Simon will discuss the SD-WAN technologies and capabilities, covering performance, network visibility, service chaining, and security, that define how you build a better WAN.

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Empower Employee Productivity with a Blueprint for the Digital Workplace Add to Schedule Eugene Berger  |   Hewlett Packard Enterprise Aruba UK&I CT   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 15:00 to 15:30

    Empower Employee Productivity with a Blueprint for the Digital Workplace

    GenMobile employees expect 24x7 access to tools and applications that foster greater collaboration and flexible approaches to work. But who are they and what business value do they provide? In this session, we will examine their traits, sharing best practices on how to optimize experience through a Mobile First Platform.

    Speaker

    Photo Speaker Name Profile
    Eugene Berger Eugene Berger View Profile
  • Ransomware-as-a-Service drives Next-Gen Antimalware Products Add to Schedule Bogdan Botezatu  |   BitDefender   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 15:00 to 15:30

    Ransomware-as-a-Service drives Next-Gen Antimalware Products

    The cybercrime market is growing in maturity and sophistication driving new business models such as Ransomware-as-a-Service. The opaque nature of this business ensures that nobody outside of the circle of trust can realize the magnitude of the operations, but internal telemetry from Bitdefender and intelligence harvested during assisted takedowns allows us to put the pieces together. Join this talk to learn more about how the actors operate in the black market, how do buyers and sellers go about the business, how do they communicate, what services do they offer and with what guarantees etc. and how this new business delivery model is having a direct impact on the exponential growth of malware today and for the foreseeable future.

    Speaker

    Photo Speaker Name Profile
    Bogdan Botezatu Bogdan Botezatu View Profile
  • Endpoints: The Starting Point In Modern Security Add to Schedule Vijay Ramanathan  |   Code42   |   Backup & Availability

    Backup & Availability Theatre

    Wed 5th Oct 15:00 to 15:30

    Endpoints: The Starting Point In Modern Security

    As a security executive, you must accept the fact that data threats are constant. The security tech stacks you currently deploy are typically proactive policies that combat threats from the server, over the network, and to the device. Even with the most robust security and stringent policies and procedures in place, not all threats are detectable–because they target your users. Learn why security strategies are evolving to start at the endpoint, and how endpoint data protection will be at the core of the modern security tech stack.

    Speaker

    Photo Speaker Name Profile
    Vijay Ramanathan Vijay Ramanathan View Profile
  • Data Protection in a regulated world Add to Schedule Martin Warren  |   NetApp EMEA  |   Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 15:00 to 15:30

    Data Protection in a regulated world

    With the introduction of ever more stringent data protection regulations such as the EU’s General Data Protection Regulation (GDPR), the need to know exactly where your data is stored and who has access to it has never been more important. In this session we will provide an overview of some of the regulative changes ahead, along with taking a look at a range of innovative technology solutions that can help to address the situation

    Speaker

    Speaker Name Profile
    Martin Warren View Profile
  • Secure and Optimise your XenApp and XenDesktop Add to Schedule Tech Leaders  |  Application Virtualisation

    Application Virtualisation Theatre

    Wed 5th Oct 15:00 to 15:30

    Secure and Optimise your XenApp and XenDesktop

    AppSense are the market leader in User Environment Management. As a long standing Citrix Ready partner, AppSense has been utilised on Citrix infrastructures for over 16 years. This session will focus on how 2 key elements of the AppSense User Environment Management solution can both help secure and improve the performance of your Citrix user estate. By utilising patented technology, AppSense is able to increase user density, ensure a consistent performance and yet simultaneously control authorised applications, prevent users from running unauthorised applications, (including Malware) and reduce the number of Citrix images required.

    Speakers

    Photo Speaker Name Profile
    Daniel Moss Daniel Moss View Profile
    Simon Townsend Simon Townsend View Profile
  • Capacity to Create Your Hybrid Cloud Add to Schedule Joe Fagan  |   Seagate Technology   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Wed 5th Oct 15:00 to 15:30

    Capacity to Create Your Hybrid Cloud

    The Cloud, be it hybrid, private, public or otherwise, couldn’t exist without Storage.

    And Storage, combined with Compute and Networking, is one of the sine qua non of IT. Think of them as food, water and oxygen. Take Storage away and the others cease to matter.

    Seagate has been a technology and industry leader for the past 30 years. But the world is no longer storage-centric: it’s data-centric. Everything Seagate does is focused on helping people get the most value from their data.

    This brief talk will be a whistle-stop tour of some of the new approaches and technologies (Seagate Kinetic and Active Disk) that enable customers to drive insight from their data via hybrid cloud, both today and into the future. It compares the progress of SSD and HDD and alternative technologies, and maps out how HDD can stay on the aerial density curve for the foreseeable future. Technology touched on will be HAMR (Heat Assisted Magnet Recording), Two-Dimensional magnetic recording, and Bit Patterned Media.

    Speaker

    Photo Speaker Name Profile
    Joe Fagan Joe Fagan View Profile
  • Leveraging True Convergence Add to Schedule Tech Leaders  |  Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 15:00 to 15:30

    Leveraging True Convergence

    Delivering computing infrastructure has become a balancing-act between deployment of frameworks like OpenStack, software providing the illusion of convergence and virtualization trying to maintain a return on the investments made across the silos of commodity hardware. KALEAO KMAX introduces the first true-convergence platform delivering appliance-level simplicity and the cost advantages of ARM 64bit hardware within a fully integrated hardware/software stack for the out-of-the-box, web-scale delivery of application services.

    This talk will introduce the KMAX technology, the system design choices and the KALEAO physicalization which enables software defined hardware management of disaggregated resources, reaching unparalleled results in performance and energy efficiency.

    Speakers

    Photo Speaker Name Profile
    Dr Julian Chesterfield Dr Julian Chesterfield View Profile
    Prof. John Goodacre Prof. John Goodacre View Profile
  • Consumerisation of IT Add to Schedule Andy Nolan  |   Lifesize  |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 15:00 to 15:30

    Consumerisation of IT

    Thanks to the proliferation of mobile devices in our personal lives , we’ve come to expect a certain level of simplicity, ease and ubiquity in how we connect. This is now reflected in the generation Y employee who wants to work from any location, on any device. With businesses now playing in the global economy this is amplified. For distributed workforces real-time access, and collaboration is essential - anywhere, anytime. The prevalence of cloud is driving this profound shift in how people and businesses think and operate.

    Speaker

    Photo Speaker Name Profile
    Andy Nolan Andy Nolan View Profile
  • Delivering Data Centres - Guide to Meeting & Future Proofing the Ever Changing Demands of ‘White Space’ Brought to you in Partnership betwee... Add to Schedule Paul Roberts  |   Minkels Ltd  |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Wed 5th Oct 15:00 to 15:30

    Delivering Data Centres - Guide to Meeting & Future Proofing the Ever Changing Demands of ‘White Space’ Brought to you in Partnership betwee...

    In this era of globalisation and cloud computing, more and more data centres are being developed to keep pace with the growing exchange of data. However, the needs of the data centre are both challenging and changing. This presentation is an introduction to delivering data centres and considers these challenges and ever changing demands.
     
    The presentation discusses the issues that must be addressed and co-ordinated by the building and operating team to deliver efficient, flexible and secure data centres.

    Speaker

    Photo Speaker Name Profile
    Paul Roberts Paul Roberts View Profile
  • Absolute presents: Hedging Your Bets: A Layered Approach to Security Add to Schedule Geoff Glave  |   Absolute   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 15:00 to 15:30

    Absolute presents: Hedging Your Bets: A Layered Approach to Security

    Ten years ago it was all about keeping things out with most organisations focussed on firewalls, anti-virus, and encryption. Today it’s a given that many risks have already made it past the front door – which, with mobility, can be accessed from just about anywhere in the world. As a result, many organisations have upped their game, employing a strong playbook involving multiple players so they can tackle and respond to each play as it happens – and with significant back-up if a player goes down.

    Join Geoff Glave from Absolute for an insightful presentation on the strategic benefits of applying a layered approach to security. The session will include examples of security incidents that could have been avoided if this approach had been in place.

    Speaker

    Photo Speaker Name Profile
    Geoff Glave Geoff Glave View Profile
  • Shrinking the Enterprise Attack Surface in the Age of Cloud, Mobility and Ubiquitous Access Add to Schedule Eugene Rusen  |   Certes Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 15:00 to 15:30

    Shrinking the Enterprise Attack Surface in the Age of Cloud, Mobility and Ubiquitous Access

    The attack surface of enterprises is exploding, with widespread adoption of the Cloud, new smart devices, and app access extended to users of all types inside and outside the perimeter. Yet the foundational IT security architecture has remained the same, giving rise to a continuing wave of data breaches. Just like stealth technology shrinks the targetable attack surface of a ship, emerging best practices are proving to reduce the attack surface of an enterprise that is exposed to attackers. These techniques focus on aligning security controls with business needs while also containing breaches when attackers compromise the infrastructure.

    Speaker

    Speaker Name Profile
    Eugene Rusen View Profile
  • Finding the weakest link in your Attack Path Add to Schedule Gavin Millard  |   Tenable Network Security  |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 15:00 to 15:30

    Finding the weakest link in your Attack Path

    With continuous asset discovery, integrations into threat intelligence feeds, and increased telemetry data from the end points, our ability to understand, manage and reduce the attack surface should be better than ever. Unfortunately, as we’ve seen in many research papers and headline grabbing breaches, many appear to be doing a poor job at addressing risks in a timely manner. Join Gavin Millard, EMEA Technical Director at Tenable, who will highlight some of the key problems in appropriately managing vulnerabilities and share experiences in working on large projects to drive improvements to critical controls.

    Speaker

    Photo Speaker Name Profile
    Gavin Millard Gavin Millard View Profile
  • You ARE Moving to The Cloud, But How Will You Securely Manage Identity Access When You Get There? Add to Schedule Hans-Robert Vermeulen  |   SailPoint   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 15:00 to 15:30

    You ARE Moving to The Cloud, But How Will You Securely Manage Identity Access When You Get There?

    As companies use more and more cloud services, the task of managing and governing access to those resources is more important than ever.
    Learn what elements of Identity and Access Governance should play a role in your successful and secure cloud adoption.

    Speaker

    Photo Speaker Name Profile
    Hans-Robert Vermeulen Hans-Robert Vermeulen View Profile
  • Containers with Microsoft and Docker Add to Schedule Marcus Robinson   |   Microsoft  |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 15:00 to 15:30

    Containers with Microsoft and Docker

    Containers are becoming one of the most talked about emerging technologies. Windows Server 2016 includes support for Windows containers and both Windows and Linux containers can be run on Microsoft Azure. During this session we will discuss what containers are, why we might use them, where can we deploy them and how we can manage them.
    Demonstrations will include:

    - Docker for Windows
    - Creating and running Windows Server container images using Docker and PowerShell
    - Docker Datacenter and Visual Studio Team Services

    Speaker

    Photo Speaker Name Profile
    Marcus Robinson Marcus Robinson View Profile
  • Someone bought you a Cloud Now What? Add to Schedule Jeremy Sherwood  |   ScienceLogic   |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 15:00 to 15:30

    Someone bought you a Cloud Now What?

    So you have decided to play the Cloud Game. You’re not always dealt the “Cloud” cards you want. The Business Owner is trying to stack the deck in their favor, and IT in theirs. However, they are both playing on the same team and as partners. Both trying to play to win.
    This session will provide some of the best tips and tricks for both parties to win together in the monitoring and managing of whatever “cloud” hand your dealt.

    Speaker

    Photo Speaker Name Profile
    Jeremy Sherwood Jeremy Sherwood View Profile
  • Practical machine learning for business applications Add to Schedule Dr Angie Ma  |   ASI Data Science  |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 15:00 to 15:30

    Practical machine learning for business applications

    This tutorial is a condensed introduction to the key concepts of data science from a business perspective. It is intended for those who are interested in bringing data science to their business. Data science is much more than machine learning and sophisticated algorithms, it is also about engineering implementation and generating values for business. Therefore, the fundamental principle is to understand the need of the business and formulate a feasible engineering and machine learning solution. This tutorial will give you the foundation, language and framework to talk to both experts and executives.
     
    Part 1: Data Science pipeline.
    Part 2: A bird’s-eye view on the machine learning universe. What is and is not possible
    with the latest techniques.
    Part 3: Case study. Three case studies covering three different machine learning techniques and applications.

    Speaker

    Photo Speaker Name Profile
    Dr Angie Ma Dr Angie Ma View Profile
  • Think like a hacker: Hack Yourself First Add to Schedule Mostafa Siraj  |   WhiteHat Security   |   Cyber Hack

    Cyber Hack Theatre

    Wed 5th Oct 15:00 to 16:00

    Think like a hacker: Hack Yourself First

    As hackers get ever more sophisticated and creative, the most successful way to identify potential flaws and weaknesses in your applications is to think like a hacker and “Hack Yourself First”. Doing this will help you gain an in-depth understanding of the most common vulnerabilities targeted by hackers, and insights into the defensive tactics you can use to safeguard your applications and websites.

    Speaker

    Photo Speaker Name Profile
    Mostafa Siraj Mostafa Siraj View Profile
  • 5 hot start-ups from EIT Digital Accelerator Add to Schedule

    IoT Theatre

    Wed 5th Oct 15:00 to 16:00

    5 hot start-ups from EIT Digital Accelerator

    Varaani - Hybrid personal cloud combining the best of cloud and local storage

    Speaker: Kimmo Lahdensivu, CEO, Varaani

    Synopsis: Varaani is a Finnish high-technology award-winning company building care-free personal storage solutions. It’s combining the benefits of local storage with the ubiquity of the cloud storage into one seamless user experience. It’s fast and it’s NSA free, but it’s still safe as we are backing up everything to the cloud in encrypted form. It’s affordable as Varaani has patented technology to provide the hybrid cloud with 90% less data center costs compared to anyone else.

    ***

    Cryptalk - Secure calling and messaging service to protect communication from eavesdroppers

    Speaker: Szabolcs Kun, CEO, CryptTalk

    Synopsis: CryptTalk is a VoIP communication service operating similarly to Skype or Viber - the main difference is that calls made using CryptTalk are completely secure from eavesdroppers. CryptTalk hinders the interception of users’conversations by using the most advanced encryption and authentication technologies. It has been created so that calls cannot be deciphered even if the interceptor had access to the source code of the application and administrator access to the central servers. The security of the solution has been proven by several ethical hacking attempts, most importantly it has passed the security review of the NCC Group with zero findings. The solution provides peer-to-peer communication with end-to-end encryption and provides maximum security without the need for any special hardware. The multi-award winning service is easy to use, provides superior sound quality, comprehensive enterprise features and available worldwide.

    ***

    Qarnot - Free heating and cheaper computing power with the Q.rad digital heater

    Speaker: Hélène Legay, Marketing & Communication Manager, Qarnot

    Synopsis: At Qarnot, we heat people for free with computers. Qarnot created the first computing heater using CPUs as a heat source. Without datacenter, cloud computing is dispatched into buildings heated for free. Qarnot is the greenest and cheapest cloud platform.

    ***

    Julie Desk – Meet Julie, your scheduling assistant built on Artificial Intelligence

    Speaker : Pierre Louis Mauler, Business Developer, Julie Desk

    Synopsis: Scheduling meeting is a time-consuming task: back-and-forth emailing to find a date that suits everyone, cancellations ... Managers and business executives spend about half a day per week on this low value task! What if you could easily delegate it? Julie Desk is a virtual assistant built on Artificial Intelligence who schedules all your meetings, calls, appointements: just CC Julie in your emails and she will reply and converse with your contacts to arrange a meeting according to your preferences. Come and see how Julie works and help you save time and gain productivity!

    ***

    Digiflak - Secure and Privacy-aware E- authentication and Digital Identity Management

    Speaker: Maxim Kostin, CEO, Digiflak

    Synopsis: We make Flak Secuters - all-in-one security devices, which are designed to protect the sensitive data or information of end users and companies. We help users and companies to protect computer-held data against damaging breaches by securing mobile workers’ digital keys, passwords and certificates in a safe, separate hardware environment. Devices are based on a dedicated Flak chipset hardware and Se(curit)OS firmware.

  • Wed 5th Oct 15:40 - 16:10
  • How Thieves Got Away with the Biggest Cyber Heist in History: a Technical ‘Who Done It’ Add to Schedule Dr Adrian Nish   |   BAE Systems  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 5th Oct 15:40 to 16:10

    How Thieves Got Away with the Biggest Cyber Heist in History: a Technical ‘Who Done It’

    If Hollywood releases another iteration of the 'Oceans 11' franchise, it should be based on the recent cyber attack against Bangladesh Bank. This true story has all the hallmarks of a captivating thriller – a sophisticated intrusion into the Bank’s network; a plot involving money laundering via casinos; possible links to criminal gangs; accusations of corrupt officials; and a conspiracy that would have required intricate planning.
     
    BAE Systems’ Head of Threat Intelligence, Dr Adrian Nish, will explain the timeline of events that lead to the $81million heist and how ultimately there were only 2 bytes between the thieves and their loot.

    Speaker

    Photo Speaker Name Profile
    Dr Adrian Nish Dr Adrian Nish View Profile
  • Efficiency and Intelligence from SD-WAN Add to Schedule Steve Liput  |   Juniper Networks  |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Wed 5th Oct 15:40 to 16:10

    Efficiency and Intelligence from SD-WAN

    The enterprise WAN needs to become more efficient and intelligent. SD-WAN introduces new levels of automation and intelligence to the enterprise WAN so that applications can be routed over multiple connections. This will increase performance and reduce costs. In this presentation we will cover:

    • Use cases and benefits of SD-WAN in the enterprise
    • SD-WAN as a managed service
    • Role for cloud applications on top of SD-WAN
    • How Juniper can solve your business needs

    Speaker

    Photo Speaker Name Profile
    Steve Liput Steve Liput View Profile
  • What do Businesses Really Want from their Mobile Service? Add to Schedule Alan Mackie  |   Gamma   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Wed 5th Oct 15:40 to 16:10

    What do Businesses Really Want from their Mobile Service?

    The benefits for improving business voice, data and mobile network performance are clear – improved customer service, enhanced employee productivity, collaboration and better commercial flexibility cited as just a few. However, the road to improvement is challenging, with 8 out of 10 businesses finding it more and more difficult to manage their voice, mobile and data services, according to a recent survey conducted by Gamma. In addition, 70% believe the rise in working trends (such as BYOD) has placed increasing pressure on network performance. Seeking network efficiency in an age of increased demand for mobility presents the biggest dilemma for many businesses.

    Speaker

    Photo Speaker Name Profile
    Alan Mackie Alan Mackie View Profile
  • Using Machines to Combat Criminals Add to Schedule Lloyd Webb  |   Cylance   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 5th Oct 15:40 to 16:10

    Using Machines to Combat Criminals

    Using machines to combat criminals – learn how recent advancements in cloud computing, data science and machine learning techniques are helping combat the ever increasing ransomware threats in cyber space!

    Speaker

    Photo Speaker Name Profile
    Lloyd Webb Lloyd Webb View Profile
  • Recovering from Ransomware in Minutes with Zerto Add to Schedule Darren Swift  |   Zerto  |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Wed 5th Oct 15:40 to 16:10

    Recovering from Ransomware in Minutes with Zerto

    Ransomware is now one of the biggest threats to businesses. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.
     
    Join us to learn about how to protect yourself from ransomware, including Best Practice guidelines for preventing infection in the first place, followed by details of how Zerto can be used to re-wind and recover as if the infection never happened.

    Speaker

    Photo Speaker Name Profile
    Darren Swift Darren Swift View Profile
  • PANEL: The Future of Storage Add to Schedule Panel  |  Storage & Data Management

    Storage & Data Management Theatre

    Wed 5th Oct 15:40 to 16:10

    PANEL: The Future of Storage

    We are constantly reminded that the amount of data that is produced each year is increasing at an unprecedented level. The Storage Market therefore has the daunting task of keeping pace with this landscape and so constant innovation is required to make storage faster, more compact and more efficient. The pressure to stay ahead has never been so intense in such an incredibly competitive market.  This is a great opportunity to hear the perspectives of those companies who will be defining this change.
     

    Chair: Martin Hingley, ITCandor
    Panelists:
    Alex Chircop, StorageOS
    Troy Alexander,Tintri
    Alex D'Anna, Pure Storage
    Grant Caley, NetApp

    Speakers

    Photo Speaker Name Profile
    Alex Chircop Alex Chircop View Profile
    Alex D'Anna View Profile
    Grant Caley Grant Caley View Profile
    Martin Hingley Martin Hingley View Profile
    Troy Alexander Troy Alexander View Profile
  • Hyper Converged Infrastructure as a Service - Put the cloud in your Datacenter Add to Schedule Kelly Murphy  |   Hypergrid   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Wed 5th Oct 15:40 to 16:10

    Hyper Converged Infrastructure as a Service - Put the cloud in your Datacenter

    The first generation Cloud is a one way destination where companies ultimately become locked into powerful providers. HyperConverged Infrastructure as a Service (HCIaaS) turns this model on its head (Cloud 2.0) and puts the enterprise in control of the cloud with superior economics, control, visibility and governance over who uses what cloud resources whether they are on-premise, in private hosted clouds or across any of the 18+ public clouds.

    Speaker

    Photo Speaker Name Profile
    Kelly Murphy Kelly Murphy View Profile
  • Forgotten your password? Guess what.. we don't need passwords anymore. Add to Schedule James Romer  |   SecureAuth   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Wed 5th Oct 15:40 to 16:10

    Forgotten your password? Guess what.. we don't need passwords anymore.

    Moving away from the password is seen as a difficult challenge for a variety of reasons, yet the desire to do so is well founded. By deploying an adaptive access control framework it has become possible to prove and maintain control of an identity without the use of passwords. Utilising true adaptive authentication techniques, SecureAuths access control framework allows an organisation to move completely away from the need for passwords, whilst maintaining an intelligent security perimeter around the identity.

    Speaker

    Photo Speaker Name Profile
    James Romer James Romer View Profile
  • UBA in the Real World Add to Schedule Andy Skrei   |   Exabeam   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 15:40 to 16:10

    UBA in the Real World

    Andy Skrei, a Solutions Architect at Exabeam, previously worked as a Lead Security Engineer at eBay developing and deploying technologies for their global SOC. Prior to eBay he was a manager at KPMG, helping some of the larges organizations in the world increase security maturity and reduce risk. Andy has a unique view on UBA from being a customer and now deploying it worldwide at organizations both large and small.

    Speaker

    Photo Speaker Name Profile
    Andy Skrei Andy Skrei View Profile
  • The Threat from Within: Data Breaches are an Inside Job Add to Schedule Morgan Gerhart  |   Imperva   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 5th Oct 15:40 to 16:10

    The Threat from Within: Data Breaches are an Inside Job

    Data shows that almost all data breaches involve a trusted insider. In some cases this is an intentionally malicious insider out to further their own ends. In other cases it may be an insider compromised by a cybercriminal. This session will explore the different ways insiders are involved in data breaches and why traditional security controls prove so ineffective against the “threat from within”. Based upon this, attendees will learn:
    •How different technologies do, and don’t, identify indicators of insider abuse
    •How to avoid “SIEM alert overload” and minimize false positives
    •The advantages of a data centric approach for identifying insider threats

    Speaker

    Photo Speaker Name Profile
    Morgan Gerhart Morgan Gerhart View Profile
  • Becoming a data driven organisation Add to Schedule Andy Patrick  |   Ometis   |   Data Analytics

    Data Analytics Theatre

    Wed 5th Oct 15:40 to 16:10

    Becoming a data driven organisation

    Find out what it really takes to become a data driven organisation. Understand how connecting People, Data and Ideas can help you leverage the collective human intelligence in your organisation.

    Speaker

    Photo Speaker Name Profile
    Andy Patrick Andy Patrick View Profile
  • DevOps by the Numbers – Experimentation and Metrics Driven Software Delivery Add to Schedule Rob Vanstone  |   XebiaLabs   |   Continuous Delivery

    Continuous Delivery Theatre

    Wed 5th Oct 15:40 to 16:10

    DevOps by the Numbers – Experimentation and Metrics Driven Software Delivery

    In this session we will discuss the future of software delivery and using metrics and data to drive improvements in our software delivery process. Find out which data points matter in terms of DevOps and how you can really start to improve your software and your process in an iterative, science based manner. We will discuss real world experiments ranging from micro services and containerisation to optimising more traditional release pipelines

    Speaker

    Photo Speaker Name Profile
    Rob Vanstone Rob Vanstone View Profile
  • Reinventing IT Operations with Data Driven Service Intelligence Add to Schedule Crispin Page  |   Splunk, Inc.   |   Monitoring for Operations

    Monitoring for Operations Theatre

    Wed 5th Oct 15:40 to 16:10

    Reinventing IT Operations with Data Driven Service Intelligence

    Most organisation’s IT is now facing a new set of challenges with continuous delivery, DevOps, cloud computing and BYOD. There are also more demands placed on the IT Operations team to show value from IT spend, help drive innovation and new revenue streams and also minimise any outages as this effects the bottom line. There is hope however. IT generates machine data and using Splunk this enables you to provide new levels of visibility into the health and key performance indicators of IT services. This improves monitoring of your applications and infrastructure and allows you to take a real-time, IT Operations Analytics (ITOA) driven approach.

    Speaker

    Photo Speaker Name Profile
    Crispin Page Crispin Page View Profile
  • Internet of Things – Forget the hype this is the reality... Add to Schedule Jean Turgeon   |   Avaya  |   Keynote

    Keynote Theatre

    Wed 5th Oct 15:40 to 16:10

    Internet of Things – Forget the hype this is the reality...

    Everyone has an IoT story but what is really happening out there? JT's session will cover the emergence of real life IoT scenarios, not the hype, and discuss what foundations are needed to ensure that you (as the business owner) are able to exploit these new resources to the full.

    Speaker

    Photo Speaker Name Profile
    Jean Turgeon Jean Turgeon View Profile
  • PANEL: Does architecture matter when considering UCaaS solutions? Add to Schedule Panel  |  Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Wed 5th Oct 15:40 to 16:30

    PANEL: Does architecture matter when considering UCaaS solutions?

    Hosted and cloud based solutions for unified communications are now a well established delivery model.  One of the major benefits of UCaaS is the fact that the service provider assumes responsibility for the provision of the platform.  But providers are building and offering services based on a variety of architectures, particularly in terms of connectivity and availability.  Should customers care about this?  Do you need to know and should you take into account architectural considerations when selecting your service provider?
     
    This panel aims to address this challenging topic,  Chaired by Dave Mailer, a leading independent consultant representing customers’ interests, the panel comprises senior representatives in the unified communications industry.  There will be an opportunity to hear the panellists debate alternative views and to put your questions to the panel.

    Chair: Dave Mailer, 4C Strategies
    Panelists:
    Dave Macfarlane, Gamma
    Andrew Cheel, Unify
    Brian O'Sullivan, 8x8

    Speakers

    Photo Speaker Name Profile
    Andrew Cheel Andrew Cheel View Profile
    Brian O’Sullivan View Profile
    Dave Mailer Dave Mailer View Profile
    David Macfarlane David Macfarlane View Profile
  • Wed 5th Oct 16:20 - 16:50
  • BOSH - Twenty Years of Deployment Lessons in One Tool Add to Schedule Colin Humphreys  |   Pivotal  |   Keynote

    Keynote Theatre

    Wed 5th Oct 16:20 to 16:50

    BOSH - Twenty Years of Deployment Lessons in One Tool

    The history of distributed systems deployment and orchestration is an epic tragedy of pain and loathing. The Cloud Foundry community has taken an alternative path, choosing an unorthodox strategy to deploy the complex distributed system powering the world's most successful open-source platform.
     
    This talk examines the reasons behind that choice, examines the tooling at the heart of the new strategy, and looks at how you can use the tooling for your own distributed deployments. We will also review the latest developments and the intended roadmap for the "Marmite" of orchestration tooling - you either love it or hate it - BOSH.

    Speaker

    Photo Speaker Name Profile
    Colin Humphreys Colin Humphreys View Profile
  • DevOps Session taking place in IP EXPO Keynote Theatre Add to Schedule

    Continuous Delivery Theatre

    Wed 5th Oct 16:20 to 16:50

  • Thu 6th Oct 10:00 - 10:40
  • Opening Keynote: The Father of Java, James Gosling Add to Schedule James Gosling  |   Liquid Robotics   |   Keynote

    Keynote Theatre

    Thu 6th Oct 10:00 to 10:40

    Opening Keynote: The Father of Java, James Gosling

    James Gosling – The Father of Java and legendary computer programmer joins us to give the real story behind the creation and success of Java and also a fascinating insight into his current projects which are focused at the intersection of IoT/robotics, cloud computing, and the magically mysterious world of remote digital communications.

    Speaker

    Photo Speaker Name Profile
    James Gosling James Gosling View Profile
  • Thu 6th Oct 11:00 - 11:30
  • Quantum Computing: Solving The Intractable and Guaranteeing Cloud Security Add to Schedule Jay Gambetta  |   IBM  |   Keynote

    Keynote Theatre

    Thu 6th Oct 11:00 to 11:30

    Quantum Computing: Solving The Intractable and Guaranteeing Cloud Security

    After all the hype, when will quantum approaches to computing and security really beat conventional technologies? Jay will explain why the weird and often misunderstood world of quantum physics can give greater computational capability, and give an overview of different types of quantum computing, each having different promise. He will demonstrate the IBM Quantum Experience- a 5 Qubit Quantum Processor in the cloud. He will then explain Quantum Cryptography and how it can be combined with Universal Digital Quantum Computing to guarantee security in cloud computing. In closing Jay will summarize the challenges and outlook – when will we be able to use these technologies?

    Speaker

    Photo Speaker Name Profile
    Jay Gambetta Jay Gambetta View Profile
  • Secret Hacking Techniques Add to Schedule Samy Kamkar  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 6th Oct 11:00 to 11:30

    Secret Hacking Techniques

    Since the dawn of the Internet and the Web, a broad series of hacking attack vectors have descended. Malicious hackers, researchers, and governments have demonstrated and deployed these attacks onto computers, mobile devices, and nuclear power plants. While we continue to build sophisticated technology to defend against many of these attacks, a new field of exciting research is taking place that uses side channels, physics, and low cost tools to employ powerful attacks against modern technology. We'll explore some of these fascinating, and often secretive, methods and how you can protect against, or potentially even use them.

    Speaker

    Photo Speaker Name Profile
    Samy Kamkar Samy Kamkar View Profile
  • Security threats – in email and beyond Add to Schedule Grant Hodgkinson  |   Mimecast   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Thu 6th Oct 11:00 to 11:30

    Security threats – in email and beyond

    Mimecast processes 22 billion emails every month for 19,000+ customers. Customer #1 is Mimecast themselves, where CIO, Grant Hodgkinson, has to remain one step ahead of the adversaries. These threats go way beyond email, as they do for any other organization. During this session, Grant will provide a view into the security threats his team faces – in email and beyond – and how they have developed a strategy to combat existing and new threats facing today’s global cloud infrastructure.

    Grant will also share his views on how to engage cloud and cloud security providers as many organizations are grappling with the difficult transition to pivot to this technology model.

    Speaker

    Photo Speaker Name Profile
    Grant Hodgkinson Grant Hodgkinson View Profile
  • Wi-Fi: Value Beyond Connectivity Add to Schedule Stephen Hoy  |   Aerohive Networks Europe Ltd   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 6th Oct 11:00 to 11:30

    Wi-Fi: Value Beyond Connectivity

    Wi-Fi has smashed through the Gigabit speed barrier and become the primary access medium, but are speeds and feeds the real measure of infrastructure value today?
     
    Staff, customers, patients, students, visitors, they all expect network connectivity. And while we provide access for their billions of bandwidth hungry mobile devices, are we missing an opportunity? An opportunity to start getting ROI from our Wi-Fi?
     
    Join this session to hear how leading organizations such as Clarks, are making every access point a starting point, by leveraging their Wi-Fi to transform their customer experience, and fueling new business intelligence.

    Speaker

    Photo Speaker Name Profile
    Stephen Hoy Stephen Hoy View Profile
  • Re-architecting the Remote Access Problem for the Mobile-First, Cloud-First Era. Add to Schedule Andy Kennedy  |   Zscaler  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 6th Oct 11:00 to 11:30

    Re-architecting the Remote Access Problem for the Mobile-First, Cloud-First Era.

    For the last 20 years, the solution to remote access requirements to enterprise applications has been the virtual private network (VPN). In the mobile first, cloud first era, legacy IPSec or SSL-based VPN no longer meet the demands for secure and efficient application connectivity. This session presents an entirely new approach to addressing business demands to have secure, anywhere, anytime, any device connectivity to any application irrespective if deployed on-prem or as part of private, public or hybrid cloud platforms.

    Speaker

    Photo Speaker Name Profile
    Andy Kennedy Andy Kennedy View Profile
  • Backup: The Good, the Bad and the Ugly Add to Schedule Stephen Macpherson  |   Macrium Software   |   Backup & Availability

    Backup & Availability Theatre

    Thu 6th Oct 11:00 to 11:30

    Backup: The Good, the Bad and the Ugly

    From the number one reason for data loss to some cringe worthy data disaster stories; Macrium shares their latest reseller research. Stephen will also cover end-point data security through backup, software appliance and innovations in cloud backup. The presentation will conclude with a demo of the exciting new Macrium Reflect central management console which allows IT Administrators to deploy and manage large numbers of backups across the enterprise.

    Speaker

    Photo Speaker Name Profile
    Stephen Macpherson Stephen Macpherson View Profile
  • Discover the power of storage built explicitly for virtualisation Add to Schedule Troy Alexander  |   Tintri   |   Storage & Data Management

    Storage & Data Management Theatre

    Thu 6th Oct 11:00 to 11:30

    Discover the power of storage built explicitly for virtualisation

    If your business depends on virtualised servers, databases and desktops, you need storage that guarantees the performance of those applications. Tintri VM-aware storage (VAS) is built explicitly for virtualisation and cloud.

    Tintri offers both all-flash and hybrid-flash storage platforms — but the difference lies in the software. Tintri’s operating system treats your virtual machines as the unit of management. That means you will never deal with LUNs, volumes or other remnants of outdated storage. Instead, all analytics and actions work at the VM-level to keep storage simple.

    Run multiple, concurrent hypervisors on a single storage platform to save cost; Set quality of service thresholds for critical VMs; And scale-out from terabytes to petabytes with less than one employee.

    Speaker

    Photo Speaker Name Profile
    Troy Alexander Troy Alexander View Profile
  • Innovative Endpoint Management: Patching, Deployment and System Building simplified Add to Schedule Jonathan Lange  |   baramundi software AG   |   Application Virtualisation

    Application Virtualisation Theatre

    Thu 6th Oct 11:00 to 11:30

    Innovative Endpoint Management: Patching, Deployment and System Building simplified

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software whilst avoiding complex repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Jonathan Lange Jonathan Lange View Profile
  • Journey to the Hybrid Cloud – It’s the Little Things that Matter Add to Schedule Simon Pamplin  |   Silver Peak   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Thu 6th Oct 11:00 to 11:30

    Journey to the Hybrid Cloud – It’s the Little Things that Matter

    Hybrid clouds are fast becoming a reality for organisations. However, when planning the move to a hybrid cloud environment, several key items are often overlooked which can result in additional expenses and performance problems further down the line – a major one being connectivity. In this session, Simon will review the fundamental requirements of a successful WAN architecture that will successfully enable the move to a hybrid cloud environment. He will also draw upon real-life case studies, indicating before and after metrics.

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Making Magic with Hyperconvergence at Merlin Add to Schedule Sean Channon  |   Merlin Entertainments Plc  |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Thu 6th Oct 11:00 to 11:30

    Making Magic with Hyperconvergence at Merlin

    With over 100 family entertainment sites around the world such as LEGOLAND, Madame Tussauds, and others, simple but powerful IT is needed to keep operations running smoothly as well as enable the business to continue growing. Having a diverse technology stack deployed globally added complexity to daily operations and silos of server and storage made expansion difficult.

    Hear how Merlin simplified their operations by introducing a standardised hyper convergence platform on SimpliVity, that slashed roll out times, and enabled efficient centralised management of a global infrastructure.

    Speaker

    Photo Speaker Name Profile
    Sean Channon Sean Channon View Profile
  • Managing Growth Expectations Add to Schedule Ryan Osborne   |   8x8   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 6th Oct 11:00 to 11:30

    Managing Growth Expectations

    As new pressures in the modern working world become apparent, it is clear that enterprise organisations and SMEs require smarter communication solutions. The growth of Enterprise Communications as a Service (ECaaS) is beyond doubt as well as its power in communication and collaboration. Whilst organisations search for a solution that is scalable with their growth and delivers all the tools they require, many are switching from a restrictive on-premise platform and turning to the simplicity of the cloud for all their communications needs.

    So, in this global market how do we manage growth expectations?

    Join 8x8 and discover how to:

    -       Unify disparate teams under one communications solution
    -       Cater for new workers’ needs such as flexible and mobile working
    -       Implement a system that can scale with you
    -       Providing individual departments with a platform that meets their specialist needs

    Speaker

    Photo Speaker Name Profile
    Ryan Osborne Ryan Osborne View Profile
  • Why IoT Requires a Different Approach to Data Centre Design Add to Schedule Niek van der Pas  |   Minkels   |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Thu 6th Oct 11:00 to 11:30

    Why IoT Requires a Different Approach to Data Centre Design

    Internet of Things (IoT) is dramatically changing the way data centres are designed and deployed. Right now, two levels of compute are emerging: an edge layer (e.g. micro data centres) and a core layer (e.g. hyper scale data centres). Minkels believes that each layer needs a different approach to data centre infrastructure. Only then can the right level of flexibility and efficiency be obtained to ensure a consistent optimal performance throughout the infrastructure’s life span and at the lowest possible cost of ownership.

    Speaker

    Photo Speaker Name Profile
    Niek van der Pas Niek van der Pas View Profile
  • Preparing for a new wave of aggressive privacy compliance Add to Schedule Anna Russell  |   Hewlett Packard Enterprise   |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 11:00 to 11:30

    Preparing for a new wave of aggressive privacy compliance

    This session will look at the forthcoming General Data Protection Regulations, its fundamental principles and how these will impact enterprise IT and data strategies.

    Speaker

    Speaker Name Profile
    Anna Russell View Profile
  • Shrink the Attack Surface: Managing Risk in the Modern Enterprise Add to Schedule Eugene Rusen  |   Certes Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 11:00 to 11:30

    Shrink the Attack Surface: Managing Risk in the Modern Enterprise

    Enterprises around the world are revolutionizing business with digitization, highly mobile workforces, advanced partner collaboration, and ever more agile operations driven by evolved IT. Yet widespread data breaches and increasingly damaging hacking incidents show that the security architecture must evolve as well. This workshop will explore the operational and technical factors driving the expansion of the typical enterprise attack surface and new techniques to reduce risk exposure and improve defenses.

    Speaker

    Speaker Name Profile
    Eugene Rusen View Profile
  • All Your Data are Belong to Us; How to Stay Protected Against Ransomware Add to Schedule James Burchell  |   Sophos   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 6th Oct 11:00 to 11:30

    All Your Data are Belong to Us; How to Stay Protected Against Ransomware

    Ransomware has become one of the most widespread and damaging threats that Internet users face. Since the infamous Cryptolocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from home users and businesses alike.
     
    Large numbers of new infections continue to surface despite existing protective measures. How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Simple, Effective Security with the Cisco Meraki MX Add to Schedule Joe Aronow  |   Cisco Meraki   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Thu 6th Oct 11:00 to 11:30

    Simple, Effective Security with the Cisco Meraki MX

    Meraki's cloud managed IT portfolio includes out-of-the-box centralized management capabilities to help administrators secure distributed networks. This session will provide a product update on the Cisco Meraki MX security appliance with an emphasis on new and existing security features, including a live demo of key security capabilities such as NGIPS, Advanced Malware Protection (AMP) with Threat Grid, Layer 7 Firewalling, and more.

    Speaker

    Photo Speaker Name Profile
    Joe Aronow Joe Aronow View Profile
  • Microsoft IoT Hub: Building a mature IoT (data) service Add to Schedule Paul Foster  |   Microsoft UK  |   IoT

    IoT Theatre

    Thu 6th Oct 11:00 to 11:30

    Microsoft IoT Hub: Building a mature IoT (data) service

    Microsoft IoT Hub enables rapid delivery of IoT service so a business can move quickly to consuming the instrumented telemetry, and start to operationalise insight. Proof of concept demonstrations can be delivered within a single day. Secure, global scale infrastructure capable of handling millions of devices can be deployed in under 30 mins. This session demonstrates the capabilities of IoT Hub and supporting Azure services available to deliver an IoT Data service to your business or customers.

    Speaker

    Photo Speaker Name Profile
    Paul Foster Paul Foster View Profile
  • Digital Intelligence in a Cognitive World Add to Schedule Dean J. Marsh  |   IBM Analytic Solutions   |   Data Analytics

    Data Analytics Theatre

    Thu 6th Oct 11:00 to 11:30

    Digital Intelligence in a Cognitive World

    Digital intelligence, derived from information and insight, is the true source of competitive advantage. A cognitive business needs people who can access, analyze and use every kind of data from any source, so everyone can find new ways to improve business processes. And that can give people more of what they value most—time. Time to think. And in a cognitive business, people can use that time to learn and do more than ever before by working with technology to ask inherently different questions; convert novel insights into actionable ideas; and develop new, more profitable business models. This session will explore the emerging field of Cognitive Computing and discuss the looming transformation offered by digital intelligence.

    Speaker

    Photo Speaker Name Profile
    Dean J. Marsh Dean J. Marsh View Profile
  • The Role of Pipelines in Getting to Continuous Delivery Add to Schedule Mandi Walls  |   Chef  |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 6th Oct 11:00 to 11:30

    The Role of Pipelines in Getting to Continuous Delivery

    Making the "right" way to complete complex tasks the easy way is a key step in the journey to Continuous Delivery. Creating a pipeline of activities that take changes through testing and integration phases without human intervention ensures that no steps are left out or forgotten, and creates a repeatable pathway for all changes to safely reach your production systems. In this talk, we'll discuss Chef's discoveries and experiments with building successful pipelines for customers, how these pipelines help teams generate greater velocity, and the part the pipeline plays in building and delivering reliable software.

    Speaker

    Photo Speaker Name Profile
    Mandi Walls Mandi Walls View Profile
  • InnerSource - Bringing OpenSource to the Enterprise Add to Schedule Nigel Abbott  |   GitHub   |   Open Source for Enterprise

    Open Source for Enterprise Theatre

    Thu 6th Oct 11:00 to 11:30

    Speaker

    Speaker Name Profile
    Nigel Abbott View Profile
  • Web Application Security: Challenges Old and New Add to Schedule Gary O’Leary-Steele  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Thu 6th Oct 11:00 to 12:00

    Web Application Security: Challenges Old and New

    The nature and wide variety of security vulnerabilities to be found within web applications mean that, despite typically forming the majority of a host's total attack surface, they cannot be secured by simple firewall rules or simple vendor software patches. Recent trends in application development, namely rich HTML5 applications, have opened up new attack vectors which usually go under the radar of developers (such as cross-origin communication), and this situation is compounded by the fact that traditional web application vulnerability scanning techniques are no longer viable for systems such a single page web applications built upon modern frameworks such as AngularJS. Moreover, classical vectors such as basic Cross-Site Scripting and SQL Injection are still being underestimated and abused to devastating affect despite being covered extensively over the years in security literature.

    Speaker

    Speaker Name Profile
    Gary O’Leary-Steele View Profile
  • Thu 6th Oct 11:40 - 12:10
  • The Future of Technology - a world of open, memory-centric computing Add to Schedule David Chalmers  |   Hewlett Packard Enterprise  |   Keynote

    Keynote Theatre

    Thu 6th Oct 11:40 to 12:10

    The Future of Technology - a world of open, memory-centric computing

    Data centre infrastructure has evolved quickly with converged and more recently hyperconverged systems offering greater control through a software layer.  The latest step in this evolution towards a fully 'software-defined' data centre is composable infrastructure. David Chalmers will cover these latest demands and developments and show how the fundamental structure of computers needs to change from processor-centric to memory-centric computing.
     
    “By every indication we are seeing Moore’s Law starting to slow down,” Chalmers said. “Data keeps growing exponentially but the computing power is not keeping up.”
     
    Come and hear about the future of technology – from the data centre to the edge!

    Speaker

    Photo Speaker Name Profile
    David Chalmers David Chalmers View Profile
  • Delivering Lower Cost and Lower Risk in the Cloud Add to Schedule Tech Leaders  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 6th Oct 11:40 to 12:10

    Delivering Lower Cost and Lower Risk in the Cloud

    Tom Patterson, from Unisys and Max Peterson, from Amazon Web Services, take the companies’ collaboration from the boardroom, onto the stage, to deliver an exciting presentation on best practice for delivering low risk, low cost cloud environments. The session will examine the risks and rewards of doing business in the cloud and how to build safe and simple paths to move workloads into the cloud, without giving up control. In addition the Dynamic Duo will also guide you through the benefits of adding microsegmentation to your cloud environments and the benefits of extending enterprise security and identities to the cloud.

    Speakers

    Photo Speaker Name Profile
    Max Peterson Max Peterson View Profile
    Tom Patterson Tom Patterson View Profile
  • Cloud Networking Agility with Riverbed SteelConnect SD-WAN Add to Schedule Brad Wood  |   Riverbed  |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Thu 6th Oct 11:40 to 12:10

    Cloud Networking Agility with Riverbed SteelConnect SD-WAN

    This session will cover Riverbed’s unique SD-WAN approach to connecting to cloud ecosystems, as well as address the time test problem of moving data between clouds.

    Speaker

    Photo Speaker Name Profile
    Brad Wood Brad Wood View Profile
  • Security without Boundaries Add to Schedule Jay Allen  |   IBM Security   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 6th Oct 11:40 to 12:10

    Security without Boundaries

    Join us as we look at one of the biggest challenges that businesses face today, The need to provide Mobile working and merging this with corporate Security Strategy!

    Speaker

    Photo Speaker Name Profile
    Jay Allen Jay Allen View Profile
  • Social Engineering: Are You the Weakest Link? Add to Schedule Greg Iddon  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 6th Oct 11:40 to 12:10

    Social Engineering: Are You the Weakest Link?

    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
     
    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
     
    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • Mind the Availability Gap – Protecting your business with Veeam Add to Schedule Russell Nolan  |   Veeam Software UK Ltd  |   Backup & Availability

    Backup & Availability Theatre

    Thu 6th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Russell Nolan Russell Nolan View Profile
  • How New College, Oxford University revitalised their Virtualisation data processing capability. Add to Schedule Paul Haddow  |   Tegile Systems   |   Storage & Data Management

    Storage & Data Management Theatre

    Thu 6th Oct 11:40 to 12:10

    How New College, Oxford University revitalised their Virtualisation data processing capability.

    New College, Oxford University revitalised their IT Infrastructure by upgrading to next generation storage infrastructure from Tegile. In this session learn how Tegile helped New College to reduce data processing to 25% of its original time, increase performance of their virtual desktop environment and benefit from reduced overall capacity, power and overheads for their IT infrastructure.

    Speaker

    Photo Speaker Name Profile
    Paul Haddow Paul Haddow View Profile
  • Explore Citrix Technologies for Application and Desktop Virtualisation Add to Schedule John Moody  |   Citrix Systems UK Ltd   |   Application Virtualisation

    Application Virtualisation Theatre

    Thu 6th Oct 11:40 to 12:10

    Explore Citrix Technologies for Application and Desktop Virtualisation

    Citrix XenDesktop enables IT to mobilise your business, while reducing costs by centralising control and security. Incorporating the full power of Citrix XenApp, XenDesktop can securely deliver full desktops or just apps to any device, over any network, to empower people to work their way. Explore how Citrix can help you migrate to Windows 10 and how Citrix is helping to accelerate, embrace, and mobilise Microsoft’s newest platform with XenDesktop! Citrix and Microsoft unveil “v2” solution for Skype for Business and Windows Server 2016 support within Xenapp!

    Speaker

    Photo Speaker Name Profile
    John Moody John Moody View Profile
  • Hybrid IT: Managing A Complex Reality Add to Schedule Len Padilla  |   NTT Europe Ltd   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Thu 6th Oct 11:40 to 12:10

    Hybrid IT: Managing A Complex Reality

    Hybrid IT is here to stay for the foreseeable future. This combination of on-premises, hosted and Cloud services, alongside BYOD and IoT, makes for a complicated mix of legacy and new technology. Building, controlling and sustaining an effective Hybrid IT estate is a challenge in itself – but it also needs to meet agile business requirements. The most efficient way to make it all work seamlessly, is to make it homogenous. In this session explore how hybrid management systems and managed services can make this a reality and remove the challenge from the distributed nature of IT platforms.

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • Journey to Enterprise Cloud: Making Datacenter Infrastructure Invisible Add to Schedule Paul Phillips  |   Nutanix  |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Thu 6th Oct 11:40 to 12:10

    Journey to Enterprise Cloud: Making Datacenter Infrastructure Invisible

    Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy datacenter infrastructure built upon of standalone storage. This session will tackle traditional workloads, deploy new scale-out applications, simply operations, reduce costs and make your datacenter infrastructure invisible by embracing these disruptive new technologies. The talk will also cover performance and availability best practices for storage, networking, and compute/virtualization for high performance databases and applications, and server workloads and explore a few examples of production deployments on HCI.

    Speaker

    Photo Speaker Name Profile
    Paul Phillips Paul Phillips View Profile
  • Evolving WAN strategies in the Public Sector and enabling change Add to Schedule Paul Wakefield  |   Gamma   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 6th Oct 11:40 to 12:10

    Evolving WAN strategies in the Public Sector and enabling change

    Driving more value in the Public Sector Marketplace, for buyers and channel partners

    Whether you are a buyer in the public sector or just want better access to supply it, this session focuses on how we can make it work better for everyone. For buyers we will talk about successful procurement strategies to drive down costs, achieve best of breed solutions, and gain the greatest response to tenders - while for suppliers who want to gain access to this market we can show you how.

    Speaker

    Speaker Name Profile
    Paul Wakefield View Profile
  • Making Powerful Savings with your Uninterruptible Power Supply Add to Schedule Chris Cutler  |   Riello UPS Ltd   |   Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Thu 6th Oct 11:40 to 12:10

    Making Powerful Savings with your Uninterruptible Power Supply

    The wrong choice of UPS equipment in your Data Center could cost thousands of pounds throughout its lifespan. Based on a live application, we take a look at how replacing legacy UPS equipment can reduce your running costs whilst also cutting your CO2 emissions.

    Speaker

    Photo Speaker Name Profile
    Chris Cutler Chris Cutler View Profile
  • Beyond Files: The Full Spectrum of Attacks Add to Schedule Eran Ashkenazi  |   SentinelOne  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 11:40 to 12:10

    Beyond Files: The Full Spectrum of Attacks

    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Advanced Threat Protection Add to Schedule Steve Mulhearn  |   Fortinet   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 11:40 to 12:10

    Advanced Threat Protection

    As enterprises struggle to fend off the barrage of cyber attacks it’s obvious that their security strategy from the past is no longer effective. Lack of technology, mismatched products from different vendors, and disparate sources of threat intelligence (if any) are leaving too many gaps in their network’s security infrastructure, gaps that are being exploited by the cyber criminal and hacker communities. This presentation will introduce a strategy to close off those gaps – multiple technologies working together across multiple attack surfaces to provide a multi-layer defense that is both proactive and reactive and supported by real time threat intelligence.

    Speaker

    Photo Speaker Name Profile
    Steve Mulhearn Steve Mulhearn View Profile
  • Using Predictive Detectors to Track Attackers Add to Schedule Paolo Passeri  |   OpenDNS, now part of Cisco   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 6th Oct 11:40 to 12:10

    Using Predictive Detectors to Track Attackers

    Whether targeted or opportunistic, online threats are becoming increasingly sophisticated and evasive. However, unlike attack vectors, the infrastructures used to launch the malicious campaigns cannot be concealed.

    But what if one could use the analysis of DNS traffic to reveal these infrastructures and turn this information into threat intelligence used not only to protect, but also to predict the next moves of attackers?

    OpenDNS has built such a technology and this session, which includes real world examples, will explain the details of its predictive approach, which tackles the malware from an infrastructure perspective and overtakes the limitations of traditional technologies.

    Speaker

    Photo Speaker Name Profile
    Paolo Passeri Paolo Passeri View Profile
  • When Big Data meets Small Things – Secure Event Delivery for the Internet of Things” Add to Schedule Jeff Sanderson  |   Citrix Systems UK Ltd   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Thu 6th Oct 11:40 to 12:10

    When Big Data meets Small Things – Secure Event Delivery for the Internet of Things”

    Protecting the network all the way from devices to the cloud is a new kind of networking challenge; massive scale, low-power devices, and different attacks to fight off.
    Find out how to architect your network end-to-end with gateways that deal with these new protocols and standards

    Speaker

    Photo Speaker Name Profile
    Jeff Sanderson Jeff Sanderson View Profile
  • IoT: What’s Your Business Opportunity? Add to Schedule Rob Sheppard  |   Intel  |   IoT

    IoT Theatre

    Thu 6th Oct 11:40 to 12:10

    IoT: What’s Your Business Opportunity?

    Learn about the inflections bringing about the IoT Era of Ubiquitous Intelligence, how Intel is uniquely positioned to deliver on end to end IoT Solutions and how you as a customer or provider can benefit from Intel’s IoT Solutions.

    Speaker

    Photo Speaker Name Profile
    Rob Sheppard Rob Sheppard View Profile
  • An Iota of Insight for IoT? There's a Better Way Add to Schedule Raja Mukerji  |   ExtraHop Networks   |   Data Analytics

    Data Analytics Theatre

    Thu 6th Oct 11:40 to 12:10

    An Iota of Insight for IoT? There's a Better Way

    Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents!

    Speaker

    Photo Speaker Name Profile
    Raja Mukerji Raja Mukerji View Profile
  • Container based ALM for Just-In-Time Releases Add to Schedule Vinothini Raju  |   Bluemeric Technologies   |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 6th Oct 11:40 to 12:10

    Container based ALM for Just-In-Time Releases

    Businesses are strategising DevOps implementation for just-in-time releases. With the advent of Containers, developers are more empowered than before to make modular and independent releases. However, culture, collaboration and insights are crucial for for just-in-time releases. A DevOps platform that manages the entire application lifecycle right from requirements gathering to integrating and deploying the builds in the form of Containers can help in rocket paced releases.

    Speaker

    Photo Speaker Name Profile
    Vinothini Raju Vinothini Raju View Profile
  • Cancelled Seminar- Open Source for Public Sector 101- CANCELLED Add to Schedule Mark Taylor  |   Sirius  |   Open Source for Enterprise

    Open Source for Enterprise Theatre

    Thu 6th Oct 11:40 to 12:10

    Cancelled Seminar- Open Source for Public Sector 101- CANCELLED

    Open Source has transforming the tech world and has now gone from nowhere to everywhere in the Public Sector in only a few short years. In the past few years Government Policy in the UK has gone from completely misunderstanding the phenomenon to being the most enlightened of any Country, anywhere in the world.

    In this session, Mark Taylor, one of the early and key movers in this transformation, will lay out the basics and develop them into everything you need to know to understand the place Open Source is taking in the Public Sector.
    Beginning with the radical shift in Government policy, and what that means in practise. Mark will take you through a rapid tour of the key technology areas, and key Open Source technologies, that are being applied in the real world to transform Public Sector IT. Illustrated with recent and relevant case studies, you will come away with the tools you need for your own Public Sector Open Source project, or simply understand more about what you may be seeing in others.

    Speaker

    Speaker Name Profile
    Mark Taylor View Profile
  • Thu 6th Oct 12:20 - 12:50
  • How do you stop the cyber curve ball? Add to Schedule Adrian Brookes  |   Avaya   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Thu 6th Oct 12:20 to 12:50

    How do you stop the cyber curve ball?

    Once they are in they are in…." - this was very much true of the US hack a year or so ago, much of their success in hacking this network was down to the ease at which they we able to move around and gather intelligence. What is needed, in conjunction with the everyday tools, is the ability to restrict the lateral movement by deploying segmentation.
    This session will show how Avaya addresses this concern through its ability to secure the everywhere perimeter.

    Speaker

    Photo Speaker Name Profile
    Adrian Brookes Adrian Brookes View Profile
  • Wi-Fi and Cloud: A Pairing Worth the Wait Add to Schedule Steve Johnson  |   Ruckus Wireless   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 6th Oct 12:20 to 12:50

    Wi-Fi and Cloud: A Pairing Worth the Wait

    As digitally savvy consumers continue to demand more seamless wireless connectivity, companies and carriers are searching for simple wireless technology deployment with less time-intensive network architectures.
     
    In light of this market demand, according to IDC, the WLAN market experienced substantial growth in the first quarter of 2016. This is a trend that they expect to continue, in part due to increased demand for the well-established benefits of cloud-managed WLAN services. Steve Johnson, Regional Director, Northern Europe at Ruckus Wireless discusses how cloud Wi-Fi and WLAN Management-as-a-Service creates unparalleled high performance access points (APs) with the public cloud for simple set-up and management without compromising on Wi-Fi performance for enterprises, small and large, at any scale.
     
    Learn how cloud Wi-Fi minimises efficiency by configuring and managing the network from anywhere, enabling network managers to benefit from cloud simplicity without having to compromise on Wi-Fi performance. Ruckus Wireless believes customers shouldn’t have to sacrifice end user experience in order to reap the benefits of the cloud.

    Speaker

    Photo Speaker Name Profile
    Steve Johnson Steve Johnson View Profile
  • TLS Black Ops Add to Schedule David Warburton  |   F5 Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 6th Oct 12:20 to 12:50

    TLS Black Ops

    The use of SSL/TLS is continuing to grow due to concerns over privacy and trust as well as the gradual adoption of new protocols such as HTTP/2 and the soon to be ratified TLS1.3. Despite all the security and performance benefits these bring encrypted traffic is also allowing malware to hide and enabling insiders to leak corporate information. This session will look to give you some advice on TLS best practises, understand some of the common (and more unique) attacks on TLS, and learn what you need to plan for to adopt the new protocols.

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Alibaba Cloud, More than just cloud Add to Schedule Yeming Wang  |   Alibaba Cloud Europe  |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Thu 6th Oct 12:20 to 12:50

    Alibaba Cloud, More than just cloud

    China’s largest public cloud service provider and world’s 4th biggest web hosting provider.

    Run your cloud on China's largest and most trusted cloud services provider and the world's fourth largest website hosting provider.

    Alibaba Cloud offers the same cloud infrastructure that powers Alipay, an online payment service that can process a record breaking 140,000 payments per second, and the multi-billion dollar e-commerce platform Alibaba.com.

    This cutting-edge cloud computing technology is now available exclusively to Alibaba Cloud users. Alibaba Cloud provides users with a comprehensive range of cloud services that can be deployed in China and globally in the categories of computing, database, networking, security and storage.

    Speaker

    Photo Speaker Name Profile
    Yeming Wang Yeming Wang View Profile
  • Secure File Sharing: Embracing employee collaboration Add to Schedule Rajesh Ram   |   Egnyte   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 6th Oct 12:20 to 12:50

    Secure File Sharing: Embracing employee collaboration

    Content collaboration transforms business by allowing organizations to connect, protect, and unlock value from all their content regardless of where that content is stored thanks to the cloud and mobility. But how do you get teams collaborating on content securely and safely without moving all your corporate assets to the cloud or depending on a cloud from an international organization you're not sure you can trust?

    Speaker

    Photo Speaker Name Profile
    Rajesh Ram Rajesh Ram View Profile
  • Is Your Web Security Broken? 10 Reasons Why You Need To Move Your Web Security To The Cloud Add to Schedule Pete Starr   |   CYREN  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 12:20 to 12:50

    Is Your Web Security Broken? 10 Reasons Why You Need To Move Your Web Security To The Cloud

    The exploding mobile workforce and cloud computing have exposed enterprises to new threats, attacks and data loss. Administrators struggle to protect a decentralized workforce with centralized security appliances which are inflexible, costly and insecure. Traditional web security appliances with limited URL filtering and anti-malware capabilities continue to fall further behind, and can’t keep pace with today’s evolving threats.

    Speaker

    Photo Speaker Name Profile
    Pete Starr Pete Starr View Profile
  • Aligning your mobile strategy with security and end user satisfaction Add to Schedule Sinisha Patkovic   |   BlackBerry Security Advisory  |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 12:20 to 12:50

    Aligning your mobile strategy with security and end user satisfaction

    See how you can align mobility to your business strategy, whilst avoiding trade-offs between mobile productivity, user satisfaction, agile IT and Security.

    Speaker

    Photo Speaker Name Profile
    Sinisha Patkovic Sinisha Patkovic View Profile
  • Secure your Business With an Army of Vetted Ethical Hackers Add to Schedule Jack Blockley  |   Synack Inc   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 6th Oct 12:20 to 12:50

    Secure your Business With an Army of Vetted Ethical Hackers

    Despite major investments in security staff, software and hardware, cybercrime hackers are still able to get through. To increase the protection of your IT systems and beat the hackers you have to think like a hacker.
    In this session, explore how organizations can utilize trusted ethical hackers, or “Red Teams” to:

    · Proactively detect, report, and help patch holes in an organization's most sensitive systems, before a criminal hacker gets there first.
    · Understand how areas of weakness and subsequent exploitation relates to overall business risk, and how vulnerabilities can be prioritized for remediation.
    · Gain a true understanding of how an adversary views your networks and digital applications and protect yourself proactively with a pool of the best security researchers available.

    Speaker

    Photo Speaker Name Profile
    Jack Blockley Jack Blockley View Profile
  • The Threat from Within: Data Breaches are an Inside Job Add to Schedule Morgan Jay  |   Imperva   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Thu 6th Oct 12:20 to 12:50

    The Threat from Within: Data Breaches are an Inside Job

    Data shows that almost all data breaches involve a trusted insider. In some cases this is an intentionally malicious insider out to further their own ends. In other cases it may be an insider compromised by a cybercriminal. This session will explore the different ways insiders are involved in data breaches and why traditional security controls prove so ineffective against the “threat from within”. Based upon this, attendees will learn:
    •How different technologies do, and don’t, identify indicators of insider abuse
    •How to avoid “SIEM alert overload” and minimize false positives
    •The advantages of a data centric approach for identifying insider threats

    Speaker

    Photo Speaker Name Profile
    Morgan Jay Morgan Jay View Profile
  • Unlocking Business Value Using Data Add to Schedule Charles Adriaenssens  |   Splunk, Inc.   |   Data Analytics

    Data Analytics Theatre

    Thu 6th Oct 12:20 to 12:50

    Unlocking Business Value Using Data

    In a world where businesses are creating more data than ever before, having the ability to mine, analyse and derive insights from all data sources has become the key to gaining competitive advantage in an increasingly digital world. This session will focus on how businesses can use analytics to drive better decision making.

    Speaker

    Photo Speaker Name Profile
    Charles Adriaenssens Charles Adriaenssens View Profile
  • How Customers are Operationalizing their DevOps Tool Chain from Planning-to-Ops! Add to Schedule Phil Hombledal  |   CollabNet   |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 6th Oct 12:20 to 12:50

    How Customers are Operationalizing their DevOps Tool Chain from Planning-to-Ops!

    Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when , why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. Attend this informative session to learn how customers are able to achieve a level of transparency that enables everyone from Planning-to-Ops to make informed decisions based on business priority and leverage automation to accelerate identifying issues and fast fix to drive continuous feedback and KPI insight.

    Speaker

    Photo Speaker Name Profile
    Phil Hombledal Phil Hombledal View Profile
  • Docker 101 - What Is Docker & How Does It Improve Software Delivery Add to Schedule Richard Wadsworth  |   Contino  |   Open Source for Enterprise

    Open Source for Enterprise Theatre

    Thu 6th Oct 12:20 to 12:50

    Docker 101 - What Is Docker & How Does It Improve Software Delivery

    In this session we will introduce Docker, the revolutionary container technology.  This will be a high level presentation which will explain the benefits of the technology and what is involved with production deployment.

    Speaker

    Photo Speaker Name Profile
    Richard Wadsworth Richard Wadsworth View Profile
  • Simple and Economical - the Value of Hyperconvergence Add to Schedule Bruce Milne  |   Pivot3   |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Thu 6th Oct 12:20 to 12:50

    Simple and Economical - the Value of Hyperconvergence

    Over the last decade, you have achieved the extraordinary. But the business wants more, whether its improving consolidation efficiencies or boosting IT agility and responsiveness. HCI offers the potential for simplicity, agility and improved economics, but making sure that you incorporate the correct architectural and deployment approaches into your next generation data center is vital. In this session, Bruce Milne, VP at Pivot3, will explore the architectural concepts and business impact examples of HCI, and illustrate how Pivot3’s pioneering Hyperconverged architecture and revolutionary software capabilities can enable you to drive transformational business benefits while improving ROI.

    Speaker

    Photo Speaker Name Profile
    Bruce Milne Bruce Milne View Profile
  • PANEL: The Future of Colocation Add to Schedule Panel  |  Data Centre Efficiency & DCIM

    Data Centre Efficiency & DCIM Theatre

    Thu 6th Oct 12:20 to 12:50

    PANEL: The Future of Colocation

    With the explosion of data, the demand for flexibility and the cost of running in-house data centres rising sharply,  IT departments are looking at a number of options to keep pace with the rate of change. One solution for this, colocation, is an increasingly popular option due to the increased scalability, connectivity and stability it offers, usually at a more reasonable price than running your own data centre. Join 4 industry experts as they discuss the future of colocation and how it can complement your data centre or cloud strategies.

    Chair: Philip Collerton, Uptime Institute
    Panelists:
    Jon Arnold, Volta Data Centre
    Greg Mcculloch, Aegis Data Centre
    Alan Dean, CoreIX
    Petter Tømmeraas, Green Mountain
    Danny Quinn, DataVita

    Speakers

    Speaker Name Profile
    Alan Dean Alan Dean View Profile
    Danny Quinn View Profile
    Greg McCulloch Greg McCulloch View Profile
    Jonathan Arnold Jonathan Arnold View Profile
    Petter Tømmeraas Petter Tømmeraas View Profile
    Philip Collerton View Profile
  • PANEL: The Future of the Internet of Things Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Thu 6th Oct 12:20 to 13:10

    PANEL: The Future of the Internet of Things

    The Internet of Things is going to change the world – but how is it going to change my business? How will Artificial Intelligence and Analytics fully realise the potential for IOT and bring about the truly connected enterprise? We’re moving from hype to reality in IOT and we are delighted to have secured experts from the world of cyber security, analytics, AI to help chart the future for IOT and crucially how it will influence your business.

    Chair: Jamie Moss, Ovum
    Panelists:
    Alicia Asin Pérez, Libelium
    David Spezia, Tableau
    Harvey Lewis, Deloitte MCS
    James Hatch, BAE Systems

    Speakers

    Photo Speaker Name Profile
    Alicia Asin Pérez Alicia Asin Pérez View Profile
    David Spezia David Spezia View Profile
    Harvey Lewis Harvey Lewis View Profile
    James Hatch James Hatch View Profile
    Jamie Moss Jamie Moss View Profile
  • PANEL: The Future of DevSecOps Add to Schedule Panel  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 6th Oct 12:20 to 13:20

    PANEL: The Future of DevSecOps

    DevOps is on a high speed trajectory to help enterprises automate and manage their software supply chains, whether in finance, government, technology, manufacturing or health industries. Where does this leave security? Join us for a discussion of how security must be included in any automated software solution, starting from the planning stages through deployment.

    Chair: Mark Miller, Sonatype
    Panelists:
    Shannon Lietz, DevSecOps Leader
    Chris Swan, CSC

    Speakers

    Photo Speaker Name Profile
    Chris Swan Chris Swan View Profile
    Mark Miller Mark Miller View Profile
    Shannon Lietz Shannon Lietz View Profile
  • How Weak are Passwords and a Mobile Future for Authentication Add to Schedule Dan McLoughlin  |   Vasco Data Security  |   Cyber Hack

    Cyber Hack Theatre

    Thu 6th Oct 12:20 to 13:20

    How Weak are Passwords and a Mobile Future for Authentication

    Learn about how weak your static passwords can be and how Mobile solutions can improve both your user experience and security.

    Speaker

    Photo Speaker Name Profile
    Dan McLoughlin Dan McLoughlin View Profile
  • Thu 6th Oct 13:00 - 13:30
  • Using Orchestration and Automation to develop next generation Data Centres and Network infrastructure. Add to Schedule Tech Leaders  |  Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Thu 6th Oct 13:00 to 13:30

    Using Orchestration and Automation to develop next generation Data Centres and Network infrastructure.

    The adoption of the Internet of Things with connectivity between users and machine to machine are evolving how infrastructure and the collection of that data is controlled, managed and maintained.

    It is estimated that by 2020 up to 50Bn connected devices and people will be leveraging the next generation network environment to gain access and an insight to the data created and stored.

    Come and see how the use of Orchestration and Automation tools will assist you and us in the planning, deployment and optimising the next generation hybrid network environment.

    Speakers

    Photo Speaker Name Profile
    Daniel Hearty Daniel Hearty View Profile
    Richard Haddock Richard Haddock View Profile
  • Empower Employee Productivity with a Blueprint for the Digital Workplace Add to Schedule Eugene Berger  |   Hewlett Packard Enterprise Aruba UK&I CT   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 6th Oct 13:00 to 13:30

    Empower Employee Productivity with a Blueprint for the Digital Workplace

    GenMobile employees expect 24x7 access to tools and applications that foster greater collaboration and flexible approaches to work. But who are they and what business value do they provide? In this session, we will examine their traits, sharing best practices on how to optimize experience through a Mobile First Platform.

    Speaker

    Photo Speaker Name Profile
    Eugene Berger Eugene Berger View Profile
  • Trust in an Untrusting World – Cyber Resilience with Risk in Context Add to Schedule Garry Sidaway  |   NTT Security  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 6th Oct 13:00 to 13:30

    Trust in an Untrusting World – Cyber Resilience with Risk in Context

    See Cyber Resilience in action, with a live demo of NTT Security’s Global Threat Intelligence Platform and learn how we use advanced Machine Learning to put risk in context for our clients. Hear case studies about building a trusted partnership to support commercial objectives. Know your enemy.

    Speaker

    Photo Speaker Name Profile
    Garry Sidaway Garry Sidaway View Profile
  • Digital disruption – How Cloud innovation enables the Virtuous Cycle of Growth Add to Schedule Scott Pendrey  |   Intel  |   Webscale IT: Journey to Enterprise Cloud

    Webscale IT: Journey to Enterprise Cloud Theatre

    Thu 6th Oct 13:00 to 13:30

    Digital disruption – How Cloud innovation enables the Virtuous Cycle of Growth

    Digital disruption is all around us. Transformational businesses are rapidly adopting technology as a means to foster & accelerate innovation, to re-architect cost structures, and to challenge established business models. Cloud Computing is at the center of this disruption, with those companies who embrace change earliest gaining the advantage.

    For nearly 50 years, Intel has pushed the boundaries of technology to make amazing experiences possible. Jordan will discuss how Intel technology - spanning software, processor, storage, I/O and networking solutions – is helping transform todays data center into a New Center of Possibility for every business, pivotal in their transformation in the digital economy.

    Speaker

    Speaker Name Profile
    Scott Pendrey View Profile
  • The three things you need to know about Cloud-Managed Wi-Fi Add to Schedule Peter Mackenzie  |   MarQuest   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Thu 6th Oct 13:00 to 13:30

    The three things you need to know about Cloud-Managed Wi-Fi

    Infrastructure management via the cloud offers opportunities for capital cost reductions and greater operational flexibility. These benefits are increasingly driving adoption of Cloud-Managed Wi-Fi technology across all sectors. This talk, sponsored by Mojo Networks, is largely based upon the speaker’s wealth of knowledge and experience gained over many years as a leading international Wi-Fi consultant and speaker.

    Specifically, the session will address the key factors associated with delivering a successful Cloud-Managed Wi-Fi deployment and will detail how to avoid the potential pitfalls along the way.

    Speaker

    Photo Speaker Name Profile
    Peter Mackenzie Peter Mackenzie View Profile
  • The impact of the EU General Data Protection Regulations on your Business Add to Schedule Louis Vieille-Cessay  |   Hewlett Packard Enterprise  |   Storage & Data Management

    Storage & Data Management Theatre

    Thu 6th Oct 13:00 to 13:30

    The impact of the EU General Data Protection Regulations on your Business

    With the exponential growth in big data, the future lies in the ability to analyse the data. But how will the new EU General Data Protection regulations impact your business? During this session, we will discuss the impact GDPR can have on your business including :

    • Logic and key requirements of the GDPR
    • Business drivers in compliance, operational effectiveness and revenue generation
    • Technical challenges posed
    • Solutions for achieving compliance
     

    Speaker

    Photo Speaker Name Profile
    Louis Vieille-Cessay Louis Vieille-Cessay View Profile
  • The Four Keys to Locking Cloud Security Add to Schedule Tom Patterson  |   Unisys  |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 6th Oct 13:00 to 13:30

    The Four Keys to Locking Cloud Security

    Come to see Tom Patterson, Unisys’ Chief Trust Officer at the Future of Threat Intelligence theatre and learn about the four secret keys to locking and securing your cloud security. This engaging session is all about learning! Learn how to extend your identities, keep those keys safe, segment your processes and automate your transfers - all from one of the most renowned, sort after security speakers around.

    Speaker

    Photo Speaker Name Profile
    Tom Patterson Tom Patterson View Profile
  • Implementing a zero-trust model with Software Defined Secure Networking Add to Schedule Steven Jacques   |   Juniper Networks  |   Cyber Security Disruptive Technologies

    Cyber Security Disruptive Technologies Theatre

    Thu 6th Oct 13:00 to 13:30

    Implementing a zero-trust model with Software Defined Secure Networking

    Legacy models of security deployed on a defensive perimeter are proving consistently ineffective. In this discussion, Juniper will propose a new, comprehensive, zero-trust model for threat defense, which leverages for mitigation the entirety of the one thing which is a common factor in all attacks – the network itself

    Speaker

    Photo Speaker Name Profile
    Steven Jacques Steven Jacques View Profile
  • Why should I adopt Continuous Delivery and where should I start? Add to Schedule Jean-Philippe Briend  |   Cloudbees   |   Continuous Delivery

    Continuous Delivery Theatre

    Thu 6th Oct 13:00 to 13:30

    Why should I adopt Continuous Delivery and where should I start?

    Continuous Delivery (CD) makes releases boring - but what other benefits does it bring when implemented properly? This session will identify the key benefits of adopting CD to business stakeholders, end users and the teams that implement the technology. But where do you start? Come and learn how to assess your CD maturity and understand the investments you need to make in the people, processes and tools.

    Speaker

    Photo Speaker Name Profile
    Jean-Philippe Briend Jean-Philippe Briend View Profile
  • Hidden Threats - how encryption came back to bite us Add to Schedule Ade Taylor  |   Palo Alto Networks   |   Cyber Attack, Remediation & Mitigation

    Cyber Attack, Remediation & Mitigation Theatre

    Thu 6th Oct 13:00 to 13:30

    Hidden Threats - how encryption came back to bite us

    Now that businesses have managed to make the vast majority of their internet transactions with users secure, we've started working on ways to make parts of it insecure again so we can check it for threats. It's not easy to do - we've created an emerging Industry to fix the thing we fixed.

    Speaker

    Photo Speaker Name Profile
    Ade Taylor Ade Taylor View Profile
  • Application Delivery. Cross-Cloud. Happy IT Add to Schedule Joe Baguley  |   VMware   |   Hybrid Cloud & Data Portability

    Hybrid Cloud & Data Portability Theatre

    Thu 6th Oct 13:00 to 13:30

    Application Delivery. Cross-Cloud. Happy IT

    As an established business or a new digital-first organisation, managing where you run your applications is important, but how you run your applications is now the critical differentiator. Joe will talk about the journey organisations are on to digital nirvana, covering the solution to IT ‘s big challenge of managing and securing information across clouds and devices, but more crucially the approaches to ‘how’ you can build and run next-generation applications. 

    Speaker

    Photo Speaker Name Profile
    Joe Baguley Joe Baguley View Profile
  • International UC2 platform deployment. Risks to overcome and lessons learned Add to Schedule
    Agustin Argelich  |   Ramon Llull University (Barcelona)   |   Unified Communications & Collaboration

    Unified Communications & Collaboration Theatre

    Thu 6th Oct 13:00 to 13:30

    International UC2 platform deployment. Risks to overcome and lessons learned

    A multinational, any undisputed global leader, requires a worldwide network of corporate telecommunications that provides efficient and economical voice, data and video communications in and between its various sites and subsidiaries.  

    The technological change that has occurred with the consolidation of IP communication solutions, the need for renewal of the old systems (PBX) due to obsolescence, the growth that most of the organizations has experienced together with the arrive to the company of new employees, members of the digital generation, have prompted multinationals to establish an appropriate and coherent global communications strategy.

    The companies’ headquarters need establish the same telecom strategy and networks to all their subsidiaries. To reduce costs and build synergies between subsidiaries, collaboration tools are mandatory.  The knowledge is spread around the organization. A unique Unified Communications and Collaboration (UC2) platform is the solution to improve internal communication and collaboration and provides the channels used by the digital born staff.

    From wide real experience, lessons learned and risk to overcome will be commented during the session. Hits and errors will be discussed from project manager point of view.

     Why a multinational must deploy a global UC2 solution? How to select the right partner, vendor or system integrator? How can you work with local and global players at the same time? On cloud or on premise? How to select the right option?

    Speaker

    Speaker Name Profile
    Agustin Argelich View Profile
  • Thu 6th Oct 13:20 - 14:10
  • PANEL: The Future of Data Analytics Add to Schedule Panel  |  Keynote

    Keynote Theatre

    Thu 6th Oct 13:20 to 14:10

    PANEL: The Future of Data Analytics

    It has been said that in the 21st Century that “Data is the new oil” but exactly how true is that proving to be. There is no doubt that organisations who can get a head start in realising the true value of their data will have a major advantage however most companies’ data analytics journeys have only just started and expectations are often overly optimistic. This session will explore the true state of data analytics and where it is actually going over the next 18 months.

    Chair: Dr Aida Mehonic, ASI
    Panelists:
    Charles Adriaenssens, Splunk
    David Spezia, Tableau
    Dean J. Marsh, IBM

    Speakers

    Photo Speaker Name Profile
    Charles Adriaenssens Charles Adriaenssens View Profile
    David Spezia David Spezia View Profile
    Dean J. Marsh Dean J. Marsh View Profile
    Dr Aida Mehonic Dr Aida Mehonic View Profile
  • Thu 6th Oct 13:40 - 14:10
  • Catch an Active Cyber Attack in 5 Minutes or Less Add to Schedule Matt Walmsley  |   Vectra Networks   |   Cloud Security & IDAM

    Cloud Security & IDAM Theatre

    Thu 6th Oct 13:40 to 14:10

    Catch an Active Cyber Attack in 5 Minutes or Less

    Cyber attackers operate undetected for an average of 146 days yet obtain admin credentials in less than 3. Detecting active attacks, reducing dwell time and accelerating incident response is key. But how?

    Vectra automates the hunt for hidden attacks inside campus networks, data centers and the cloud using advanced machine learning and data science to monitor internal traffic to detect active threats in real-time. Vectra correlates threats with under attack hosts, provides unique context about what attackers are doing, and prioritises the threats of greatest risk.

    Speaker

    Photo Speaker Name Profile
    Matt Walmsley Matt Walmsley View Profile
  • “You play the way you practice” - What CrowdStrike & the FBI taught me about responding to post-breach crisis events Add to Schedule Shawn Henry  |   CrowdStrike  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 6th Oct 13:40 to 14:10

    “You play the way you practice” - What CrowdStrike & the FBI taught me about responding to post-breach crisis events

    Modern security thinking now assumes that truly determined hackers cannot always be kept out. Today, organisations put greater emphasis on building resilience—the ability to identify, isolate, remediate and bounce back fast in the event of a breach.

    Whilst this is easily stated, how do you achieve this objective?

    Drawing on his experience in both the FBI and at CrowdStrike, Shawn’s presentation demonstrates how you should respond in a moment of crisis. What valuable lessons has he learnt over the years and how can you prepare your security in the face of an ever more sophisticated and persistent group of adversaries.

    Speaker

    Photo Speaker Name Profile
    Shawn Henry Shawn Henry View Profile
  • Secure your Business & Protect your Data with DNS Security Add to Schedule David Williamson  |   EfficientIP   |   Cloud & Network Infrastructure

    Cloud & Network Infrastructure Theatre

    Thu 6th Oct 13:40 to 14:10

    Secure your Business & Protect your Data with DNS Security

    It is important to understand that the DNS service has become a favored attack target looking to take down businesses or steal confidential data and at the same time a commonly used threat vector. We have conducted the first worldwide survey of its kind on DNS security, proving 25% of businesses are not implementing any kind of security software, costing them more than $1 million in damages!
    The study discovered that 74% of organizations have been victims of DNS attacks! We will examine how dedicated DNS security solutions can be used efficiently to protect IT infrastructures

    Speaker

    Photo Speaker Name Profile
    David Williamson David Williamson View Profile
  • What do Businesses Really Want from their Mobile Service? Add to Schedule David Macfarlane  |   Gamma   |   Wireless & Mobile

    Wireless & Mobile Theatre

    Thu 6th Oct 13:40 to 14:10

    What do Businesses Really Want from their Mobile Service?

    The benefits for improving business voice, data and mobile network performance are clear – improved customer service, enhanced employee productivity, collaboration and better commercial flexibility cited as just a few. However, the road to improvement is challenging, with 8 out of 10 businesses finding it more and more difficult to manage their voice, mobile and data services, according to a recent survey conducted by Gamma. In addition, 70% believe the rise in working trends (such as BYOD) has placed increasing pressure on network performance. Seeking network efficiency in an age of increased demand for mobility presents the biggest dilemma for many businesses.

    Speaker

    Photo Speaker Name Profile
    David Macfarlane David Macfarlane View Profile
  • Wi-Fi Security Dangers - How to Protect Your Users From Harm Add to Schedule Charles Burns  |   Xirrus   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 6th Oct 13:40 to 14:10

    Wi-Fi Security Dangers - How to Protect Your Users From Harm

    Wi-Fi has enabled the mass adoption, use and innovation of connected devices.

    With connectivity creeping into almost every aspect of our lives, we’ve come to expect public Wi-Fi at nearly every place we go.

    Wi-Fi is no longer a want, but a need. Still, very few networks are capable of protecting our data when we connect. Simply put, the networks don’t encrypt data (among other things), leaving a myriad of security risks.

    Speaker

    Photo Speaker Name Profile
    Charles Burns Charles Burns View Profile
  • How Surrey County Council Evolved their Disaster Recovery Strategy with Zerto Add to Schedule Tech Leaders  |  Backup & Availability

    Backup & Availability Theatre

    Thu 6th Oct 13:40 to 14:10

    How Surrey County Council Evolved their Disaster Recovery Strategy with Zerto

    Surrey County Council are one of the largest local government organisations in the UK and have a reputation for providing innovative solutions to address the challenges facing the Public Sector. Join Ross & Darren us to learn how, by using Zerto Virtual Replication to protect hundreds of VMs providing critical services to the wider public, the council are able to:
    • Protect themselves from threats such as ransomware with granular, file level recovery
    • Comply with data retention policies at scale using off-site cloning
    • Protect existing technology investments whilst maintaining the flexibility to adopt new solutions
    • Adapt to and embrace IT Resilience

    Speakers

    Speaker Name Profile
    Darren Swift Darren Swift View Profile
    Ross Walker