9 - 10 OCTOBER 2019 / EXCEL LONDON
Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018.

All |  Date:
3rd October
4th October 
Select a speaking company
4th October - 112
  • Thu 4th Oct 10:00 - 10:40
  • How to Fix the Future Andrew Keen  |     |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 10:00 to 10:40

    How to Fix the Future

    Promising to enrich democracy and level the playing field, the digital revolution has actually compounded inequality, created a surveillance style economy, fostered a long term unemployment crisis and poisoned our culture. So how to fix the future? Focusing on regulation, innovation, consumer power, citizen engagement and education, Andrew Keen lays out a five pronged strategy to realize the positive promise of the digital revolution. Real world examples taken from Estonia, Singapore, Silicon Valley, India, Germany

    Register now see Andrew Keen live at IP EXPO Europe.

    Register now

    Speaker

    Photo Speaker Name Profile
    Andrew Keen Andrew Keen View Profile
  • Thu 4th Oct 11:00 - 11:50
  • XSS Everywhere!: What is it, why should I care, and how can I avoid it? Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 11:00 to 11:50

    XSS Everywhere!: What is it, why should I care, and how can I avoid it?

    Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten. The client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.

    In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail whilst being accessible also at a non-technical level.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Seeing Through Human Eyes: The Power and Perils of AI Carla Echevarria  |   Google  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Seeing Through Human Eyes: The Power and Perils of AI

    In the age of intelligent machines, the most significant threat comes not from malicious machines, but from their human creators. How might we design AI systems that do not inherit human error and bias? We will discuss the process of developing machine learning systems – data gathering, model training, output generation, and human programming – and the principles of design that we must apply to these processes, in order to create AI systems that are truly beneficial for people.

    Speaker

    Photo Speaker Name Profile
    Carla Echevarria Carla Echevarria View Profile
  • Lessons I learnt about Cybersecurity from my Dad Brian Honan   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Lessons I learnt about Cybersecurity from my Dad

    At its heart many of the issues we face with cybersecurity relate to how users interact with the systems they use. Following a conversation with my father about how unsafe cars were when he was a young boy and how car safety has evolved over the subsequent decades, this talk will use that evolution of car safety to highlight how cybersecurity should evolve.

    Speaker

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
  • A connected city is a safe city Len Padilla  |   NTT Communications   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 11:00 to 11:30

    A connected city is a safe city

    Smart cities are more than a trend—they're the wave of the future because the world is becoming more urban, with 60% of the population expected to live in cities by 2050. This trend comes with new social and economic challenges. Balancing citizen expectations with shrinking budgets is a primary concern and a common theme.
    In this presentation we take a look at how technology can aid in the interoperability of public services to better serve and protect the people.

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • Never Move Data Again: Cloud Solution Combines NAS and Archive File Storage and Automatically Reduces Costs as Files Age Andy Hardy  |   Nasuni   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 11:00 to 11:30

    Never Move Data Again: Cloud Solution Combines NAS and Archive File Storage and Automatically Reduces Costs as Files Age

    What if your file servers and NAS were smart enough to know what files aren’t being accessed, and charged you less to store them? What if your NAS had infinite capacity, so you never had to migrate data to bigger boxes or tape archives? This is exactly what new cloud file services are offering. Learn how leading enterprises are using Nasuni’s multi-cloud solution with Azure and AWS public cloud object storage and Dell EMC, Hitachi, and IBM private cloud object storage to scale NAS without limits and align file storage costs with the value of their data.

    Speaker

    Photo Speaker Name Profile
    Andy Hardy Andy Hardy View Profile
  • Citrix SD-WAN – The open forum customer case study session Al Taylor  |   cloudDNA Ltd  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:00 to 11:30

    Citrix SD-WAN – The open forum customer case study session

    You asked and so here it is!

    cloudDNA present IPExpo Europe's first open forum SD-WAN customer case study session.

    Get the inside stories behind 3 recent cloudDNA Citrix SD-WAN projects, featuring customer journeys from the manufacturing, B2B service provider and public sectors.

    We'll be discussing the challenges faced, the business case justification, how the concept was proved and the unexpected benefits that have literally changed peoples lives.

    Plus, we'll be opening the mic to give you the answers to your questions so grab a coffee and join the SD-WAN revolution, your branch users will love you for it!

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Boost your workforce productivity - 5 benefits of Desktop-as-a-service Tech Leaders  |  UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 11:00 to 11:30

    Boost your workforce productivity - 5 benefits of Desktop-as-a-service

    Have you ever thought that your IT teams wouldn’t have to constantly face demands to provision, manage and support traditional desktops across company-issued laptops and other devices. Providing continuous access to business applications, data and tools is especially critical to the productivity of remote, and traveling employees, while maintaining security and minimizing exposure to data leaks or data loss.

    Join our seminar and explore how your organisation can benefit from VMware DaaS solution, what are the key benefits and how simple the move towards this could be.

    Speakers

    Photo Speaker Name Profile
    Duncan MacDonald Duncan MacDonald View Profile
    Ivo Murris Ivo Murris View Profile
  • Performance Data ≠ User Experience. A Packet (or two) will Help IT! Steve Brown  |   Viavi Solutions   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 11:00 to 11:30

    Performance Data ≠ User Experience. A Packet (or two) will Help IT!

    ‘Faster, better, cheaper’ is now the IT department mantra. Enterprises just don’t work like they did 10 years ago: Network, server, application and security team silos are worse than ever with user expectations at an all-time high.

    So why are we still trying to resolve today’s IT issues with yesterday’s processes and systems?

    Worse still, we expect better outcomes even though we’re looking at the data all wrong!

    Join us to see ‘a day in the life of a trouble ticket’ evolve into the 21st century, courtesy of intelligent networks and root-cause analysis of the right problem!

    Speaker

    Photo Speaker Name Profile
    Steve Brown Steve Brown View Profile
  • Citrix SD-WAN and Microsoft Virtual WAN simplify and optimise branch office networks deployment Jeremy Ward  |   Citrix Systems UK Ltd   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:00 to 11:30

    Citrix SD-WAN and Microsoft Virtual WAN simplify and optimise branch office networks deployment

    Built upon our long-standing partnership with Microsoft, Citrix SD-WAN is designed to integrate with the cloud to optimize bandwidth utilization and intelligently steer traffic for the best application experience. Coupled with strong integrated security, Microsoft Azure subscribers can count on protection from the ever-increasing cyber threats.

    Leveraging Microsoft Virtual WAN, together we deliver:
    • Simplified and automated large-scale branch connectivity
    • Unified network and security policy management
    • Optimized routing using Microsoft’s global network

    Speaker

    Photo Speaker Name Profile
    Jeremy Ward Jeremy Ward View Profile
  • 4 DevOps Principles for your cross-platform database team Chris Unwin  |   Redgate   |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 11:00 to 11:30

    4 DevOps Principles for your cross-platform database team

    You’re aware of the benefits of DevOps – more frequent, reliable, and secure releases to name a few. But for many, the database is often a bottleneck. When combined with teams working across multiple platforms, the ability to extend DevOps practices to the database can seem daunting.

    In this session, we discuss the Database DevOps techniques you can apply when working on both Oracle and SQL Server databases, ensuring your team delivers changes safely and quickly alongside your application code.

    We will demonstrate how you can create a cross-platform, Database DevOps enabled team by:

    Speaker

    Photo Speaker Name Profile
    Chris Unwin Chris Unwin View Profile
  • Sysadmins In The Cloud: Why The New IT Still Needs Ops Dominic Wellington  |   Moogsoft  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 11:00 to 11:30

    Sysadmins In The Cloud: Why The New IT Still Needs Ops

    With the ongoing move to ever more automated forms of IT infrastructure, the role and value of IT Operations is in question. However, there is still very much a need for Ops support; it is just defined in a different way. Far from becoming less relevant, IT is more central than ever to business success, and must be considered appropriately.

    Speaker

    Photo Speaker Name Profile
    Dominic Wellington Dominic Wellington View Profile
  • Using The Sith Mindset To Build And Hone A Jedi SIEM Samantha Humphries  |   Rapid7  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    Using The Sith Mindset To Build And Hone A Jedi SIEM

    Yes, we used a Star Wars reference to catch your attention, and now we’ve caught it we’re excited to show you the fully operational battle station that is InsightIDR. Today you’ll see a bunch of SIEMs, with great features including UEBA, automation, analytics, and threat intelligence. However, this is the only SIEM built in collaboration with the teams that make and use the world’s leading pentesting tool. During this session, you’ll hear how we use the attacker mindset to ensure your team have the very best technologies at their fingertips. And there will definitely be Star Wars references, because obviously.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • Prevention is Better than Cure – Leveraging IAM to Eliminate Phishing Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:00 to 11:30

    Prevention is Better than Cure – Leveraging IAM to Eliminate Phishing

    The current approach to tackling phishing does not work. Join Mike Newman, CEO of My1Login and Derek Gordon, Cyber Security Director for PwC, who will guide you through how to leverage your Identity & Access Management to eliminate phishing.

    Speakers

    Photo Speaker Name Profile
    Derek Gordon Derek Gordon View Profile
    Mike Newman Mike Newman View Profile
  • Evolving Security Analysis: Combining Human and Cyber Threat Intelligence Tech Leaders  |  Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:00 to 11:30

    Evolving Security Analysis: Combining Human and Cyber Threat Intelligence

    Deception tactics used by attackers are evolving faster than the defensive techniques of most email security systems. To combat this, Mimecast continuously harvests threat intelligence from billions of monthly emails. As an email security cloud gateway, we regularly see attackers using both new evasion techniques as well as malware that's over a decade old. Mimecast understands Threat Intelligence, but with all the technology in the world, do we need a human’s trained eye to spot the threat to your company or organisation?

    Speakers

    Speaker Name Profile
    Derek Buchanan View Profile
    Kirsty Kelly View Profile
  • Closing the Hidden Open Doors of SD-WAN Patrick Grillo  |   Fortinet   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:00 to 11:30

    Closing the Hidden Open Doors of SD-WAN

    SD-WAN is one of the top technology stories of the year, promising the best of everything and solving problems that you didn’t knew you had.  With all of this attention on the bright and shiny bits of SD-WAN, what has slipped through the cracks is the inconvenient truth that if SD-WAN is not properly implemented the damage it can cause will be far greater than any possible benefit.This session will focus on understanding the key shortcoming of SD-WAN, how to counter it and make sure that your SD-WAN efforts deliver their full potential.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • Automated Security in a Multi Cloud World Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:00 to 11:30

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • AI in Retail: The Path to a Personalised Shopping Experience ACCESS PLUS Oliver Gindele  |   Datatonic  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    AI in Retail: The Path to a Personalised Shopping Experience

    Empowered by the ease and availability of online shopping, many consumers already expect personalised, immediate help to guide their purchases. To reach these customers and deliver the desired personalised experience, AI is going to be invaluable to retailers. Digital transformation and experiences from insights based selling have led many retailers to heavily invest in Big Data technologies in order to build and store detailed views of their customers. In this session, Oliver will share how machine learning techniques combined with rich customer data can enable retailers to better target their customers via recommendations, personalized promotions, bundled products and tailored advertisement.

    Speaker

    Photo Speaker Name Profile
    Oliver Gindele Oliver Gindele View Profile
  • Using Machine Learning for Real-Time Threat Detection Across OT & IT ACCESS PLUS Andrew Tsonchev  |   Darktrace  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 11:00 to 11:30

    Using Machine Learning for Real-Time Threat Detection Across OT & IT

    In an era where OT and IT are increasingly converging, the threat to critical infrastructure is growing and the need to understand and secure complex networks has become unavoidable. Modern industrial networks are highly complex systems involving the interaction of diverse and bespoke devices – legacy products, proprietary protocols, and custom solutions often work side by side with corporate IT technologies and the new generation of Internet of Things devices. The challenge of providing full coverage of enterprise, industrial and IoT environments has never been greater, meaning innovations using machine learning and AI must be explored.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Thu 4th Oct 11:40 - 12:10
  • How digital is helping advance the energy transition Morag Watson   |   BP  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    How digital is helping advance the energy transition

    The world is growing fast, it’s changing even faster and it’s calling for more from the energy industry every day – not just more energy, but energy that’s better and cleaner. That’s the dual challenge. Deliver around a third more energy by 2040 and lift two and half billion out of low income. Digital technology can have a major impact on solving this dual challenge and we estimate that technologies such as supercomputing, data analytics and artificial intelligence could shift how society produces and consumes energy.
     
    In this keynote, Morag Watson, Chief Digital Innovation Officer at BP, will explain how digitization is helping BP advance the energy transition by reducing emissions, improving efficiency and creating new businesses.

    Speaker

    Photo Speaker Name Profile
    Morag Watson Morag Watson View Profile
  • Zero Trust & The Flaming Sword of Justice Dave Lewis  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • The Art of the Possible: Delivering Intelligent Data Management in the Digital Era George Kenny  |   Veeam   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 11:40 to 12:10

    The Art of the Possible: Delivering Intelligent Data Management in the Digital Era

    Data growth and the inevitable data sprawl that follows, presents data availability, protection, compliance and transparency challenges to the modern day Business. During this session, Veeam’s George Kenny will consider the barriers you face in achieving data availability across the breadth of applications and cloud, using a 5 staged approach to intelligent data management.

    Speaker

    Photo Speaker Name Profile
    George Kenny George Kenny View Profile
  • ACTIV – A revolutionary way to manage Windows-as-a-Service Chris Porter  |   Rimo3  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:40 to 12:10

    ACTIV – A revolutionary way to manage Windows-as-a-Service

    Can you afford not to test your critical apps before deploying a Windows 10 update?

    There’s now a Security Update once a month and a Feature Update twice a year.

    This poses a massive risk to application compatibility for large organisations. 

    Rimo3’s ACTIV software platform allows you to fully automate the testing of all your applications, before deploying to any end-users.  Timescales will reduce by over 90% and costs will reduce dramatically. CIO’s gain confidence that their business is protected.

    Rimo3 ACTIV is the first and only fully automated Windows 10 update platform in the market, and it’s available now!

    Speaker

    Photo Speaker Name Profile
    Chris Porter Chris Porter View Profile
  • Voice - the most important Customer contact channel for your business: How to provide the best customer experience in a mobile centric world Alan Mackie  |   Gamma   |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 11:40 to 12:10

    Voice - the most important Customer contact channel for your business: How to provide the best customer experience in a mobile centric world

    Join Gamma to learn why, in an increasingly digital world, having the correct voice solution is still core to a successful customer contact strategy.

    Speaker

    Photo Speaker Name Profile
    Alan Mackie Alan Mackie View Profile
  • Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined... Jonathan Stevenson  |   Cisco   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 11:40 to 12:10

    Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined...

    The modern network is expanding rapidly. It connects multiple branches, mobile users, the cloud, and data centres. Mobility, the Internet of Things (IoT), Bring-Your-Own-Device (BYOD) access, and cloud services are critical for business growth. Yet this complexity is making it difficult to secure a network. Many organisations may not even know where to begin when it’s time to strengthen their network defences. It’s harder to see what’s on the network, and it’s harder to spot a threat. Our Network Visibility and Segmentation solution provides you with fast threat detection, highly secure access, and software-defined segmentation.

    Speaker

    Photo Speaker Name Profile
    Jonathan Stevenson Jonathan Stevenson View Profile
  • What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough Alexandra Gates  |   Aerohive Networks   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:40 to 12:10

    What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough

    Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.

    Speaker

    Photo Speaker Name Profile
    Alexandra Gates Alexandra Gates View Profile
  • Blockchain – a Use Case deep dive and technical demos Vikram Kimyani  |   Oracle   |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 11:40 to 12:10

    Blockchain – a Use Case deep dive and technical demos

    Blockchain is one of the hottest topics in the market today, many enterprises are talking or thinking about the technology. A number have done one or more proof of concepts but when it comes to actual production use cases there are considerably fewer enterprises in this position. Vikram Kimyani from Oracle will showcase actual use cases implemented by Oracle customers and provide a demo walking through one of these use cases.

    Speaker

    Photo Speaker Name Profile
    Vikram Kimyani Vikram Kimyani View Profile
  • APIs for DevOps Teams, Creating Open Culture Bubbles Martin Percival  |   Red Hat   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 11:40 to 12:10

    APIs for DevOps Teams, Creating Open Culture Bubbles

    Getting technology choices right is less than half the battle, organisational change and technology delivery can be far more disruptive and difficult to deliver. Martin is a passionate believer in being default to open, whether that applies to code or culture.

    In his presentation Martin discusses how high performing teams are the result of the context they operate in and by setting up the right open structures and environment you will accelerate you app development and DevOps experience.

    So the big question is: Can you bring the Open Organisation to your team and create APIs with the rest of the organisation?

    Speaker

    Photo Speaker Name Profile
    Martin Percival Martin Percival View Profile
  • Security. Made Smarter: Intelligent threat detection and response Jonathan Zulberg  |   LogRhythm  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:40 to 12:10

    Security. Made Smarter: Intelligent threat detection and response

    Your job is to protect your organisation from cyberattacks. To do so, your team must make sense of a plethora of data that is growing exponentially. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need with data spread across multiple systems.

    In these circumstances, constantly evolving threats can slip through the cracks. The pressure of missing a damaging breach could be causing you to lose sleep.

    Join LogRhythm to discover how you can reduce your organisation’s risk with a smarter end-to-end approach to cybersecurity that maximises the efficiency and effectiveness of your security operations.

    Learn how:

    • NextGen SIEM enables measurably faster threat detection and response
    • UEBA improves and deepens visibility of user behaviour
    • Automation and orchestration boost efficiency and productivity
    • Threat Lifecycle Management holds the key to effective security operations
    • Machine learning and AI add a new dimension to your security analytics 
    • Cloud analytics provides the scale and intelligence needed for rapid threat detection

    Speaker

    Photo Speaker Name Profile
    Jonathan Zulberg Jonathan Zulberg View Profile
  • People and Passwords Pedro Martins  |   LastPass by LogMeIn  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:40 to 12:10

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Don't Let BYOD Put Your Whole Network at Risk Matt Boddy  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:40 to 12:10

    Don't Let BYOD Put Your Whole Network at Risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • There is no inside: Why you need to move beyond perimeter based security. Andrew Crail  |   Akamai  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:40 to 12:10

    There is no inside: Why you need to move beyond perimeter based security.

    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are even relevant. The enterprise security perimeter model doesn’t fit for today’s world. Whether you call it Zero Trust, CARTA, or BeyondCorp, a secure model to access on-premise, Iaas, and SaaS apps is the right approach for the future.

    Speaker

    Photo Speaker Name Profile
    Andrew Crail Andrew Crail View Profile
  • Cyber Attack Trends from the Threatscape Joe Nelson  |   eSentire  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:40 to 12:10

    Cyber Attack Trends from the Threatscape

    What are the latest trends in the cyber criminal underworld? Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by eSentire’s Principal Solutions Architect, Joe Nelson.

    Speaker

    Speaker Name Profile
    Joe Nelson View Profile
  • Applying AI to your Business ACCESS PLUS Alain Richardt   |   RAMM Science  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 11:40 to 12:10

    Applying AI to your Business

    Organisation can no longer ignore AI as it has now fully been recognised as the fourth Industrial Revolution. Companies must now turn their focus on devising strategies for AI adoption in order to gain competitive advantage, increase process efficiencies, enhance customer experience and ultimately improve profitability. AI solutions are individual for each company depending on variables such as process complexity, market sector and business objectives. Find out more about how AI can be applied to your business and what next steps you need to take.

    Speaker

    Photo Speaker Name Profile
    Alain Richardt Alain Richardt View Profile
  • Ten Reasons Why Your IoT Project Will Fail ACCESS PLUS Yodit Stanton  |   OpenSensors  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 11:40 to 12:10

    Ten Reasons Why Your IoT Project Will Fail

    Successful IoT deployments are going to be transformational on team productivity. 

IoT will transform how teams and work groups operate by making their environments more responsive, how firms operate by allowing them to use their physical infrastructure more efficiently. Sensor networks are a means to greater self-awareness and responsiveness giving not only rooms, but buildings and cities more complex and intelligently reactive nervous systems.

    Speaker

    Photo Speaker Name Profile
    Yodit Stanton Yodit Stanton View Profile
  • Blockchain - what is it actually good for? Exploring real world roadblocks and use cases ACCESS PLUS Helen Disney   |   Unblocked  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 11:40 to 12:10

    Blockchain - what is it actually good for? Exploring real world roadblocks and use cases

    Blockchain is the buzz word of the moment. Everyone wants to talk about it. Few understand what it can really do or where it can be applied successfully. This session will examine 4 real world use cases of blockchain and ask what are the technical, business and political stumbling blocks that still need to be addressed to ensure wider implementation.

    Speaker

    Photo Speaker Name Profile
    Helen Disney Helen Disney View Profile
  • Thu 4th Oct 12:00 - 12:50
  • If you liked it, you should have put security on it Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 12:00 to 12:50

    If you liked it, you should have put security on it

    Organisations know that cyber security is a huge concern, each year they budget for and insure against cyber incidents. However, if you follow any news, we know this fails consistently. Cyber security is confusing, and that confusion will need to negativity, shame, and embarrassment; leading to a lack of effective communication. In this talk, we will identify how to effectively approach a holistic security programme, through awareness, culture, and understanding on how to approach Security by Design.

    Speakers

    Photo Speaker Name Profile
    Louise Forrest Louise Forrest View Profile
    Zoë Rose Zoë Rose View Profile
  • Thu 4th Oct 12:20 - 13:10
  • PANEL: Privacy vs Security - the good, the bad & the ugly Panel  |  Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 12:20 to 13:10

    PANEL: Privacy vs Security - the good, the bad & the ugly

    Privacy has been in the spotlight in recent years with revelation about how much access both government agencies and more recently social networks have to personal data. However in a catch-22 situation both privacy at the expense of security and security at the expense of privacy seem to be equally unpalletable. So how does one strike a balance between two sides so far at odds with each other and find a middle ground acceptable to all parties?

    Speakers

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
    Dave Lewis Dave Lewis View Profile
    Kuan Hon Kuan Hon View Profile
    Lisa Forte Lisa Forte View Profile
    Paul Ducklin Paul Ducklin View Profile
  • Bot or human? Applying machine learning to combating the bot epidemic Laurent Gil   |   Oracle Dyn  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 12:20 to 12:50

    Bot or human? Applying machine learning to combating the bot epidemic

    Bots now make up over 50 percent of website traffic, and have become the primary source of malicious application attacks, from DDoS to sophisticated intrusions. In this session you'll learn what you need to know about bot traffic, different types of bots, and real-world applications of ML and AI to identify and defeat malicious bots.

    Speaker

    Photo Speaker Name Profile
    Laurent Gil Laurent Gil View Profile
  • Creating a Resilient Business Tech Leaders  |  Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 12:20 to 12:50

    Creating a Resilient Business

    New waves of technology like cloud or security are causing shifts in customer demands, causing a ripple effect on your business. How do you maintain a stable business while adapting to the outside pressures to change? By layering resilience on top of a foundation of good relationships. In this session, we’ll walk through a framework to identify your customer’s needs, then plan the teams, services, and solutions that offer more value, create greater stickiness, and generate more revenue.

    Speakers

    Photo Speaker Name Profile
    Gregg Lalle Gregg Lalle View Profile
    Sam Callaghan Sam Callaghan View Profile
  • Nutanix Files & Peer Software: File Services for the Cloud Era Gary Boone   |   Nutanix   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 12:20 to 12:50

    Nutanix Files & Peer Software: File Services for the Cloud Era

    In this session, we’d like to introduce Nutanix Files (formally AFS) - a fully integrated, core component of the Nutanix Enterprise Cloud which redefines hyperconvergence by allowing a single platform to be used for VMs, VM storage, containers, block storage and file storage. Nutanix Files is a software-defined scale-out file storage solution designed to address a wide range of use cases, precluding the need for a separate NAS appliance by providing a consolidated solution with unified management for VM and file services. Nutanix Files is further enhanced by full API-integration with Peer Software, enabling real-time replication for VDI data and Global File Sharing for Active-Active multisite deployments.

    Speaker

    Photo Speaker Name Profile
    Gary Boone Gary Boone View Profile
  • Secure End-Point Management in a Software defined world! Doug Brown  |   IGEL Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 12:20 to 13:05

    Secure End-Point Management in a Software defined world!

    In this session, IGEL’s Douglas Brown will discuss the state of end-user computing and how a software-defined approach to end-point management positions IT for the future, plus much more.
    In this session, you will learn:
    - VDI / SBC in the Enterprise Today
    - VDI is today, DaaS is tomorrow. Solutions like AWS, Azure, Google are effecting the requirement and rules of the end-point.
    - What Software-Defined means to EUC, End-points and End-point management.
    - IGELs solutions to help solve the changing world (UD Pocket, IGEL OS, ICG, and UMS).
    - The Future of IGEL and how that maps to the future of the Enterprise.

    This will be a very lively session, come one and come all to learn, have a few laughs, and walk away with one foot in to the future of EUC and IT!

    Speaker

    Photo Speaker Name Profile
    Doug Brown Doug Brown View Profile
  • Future Smarter with NETSCOUT visibility – Migrate to the Hybrid Cloud with Confidence Ray Krug  |   NETSCOUT  |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 12:20 to 12:50

    Future Smarter with NETSCOUT visibility – Migrate to the Hybrid Cloud with Confidence

    The ever increasing pace of digital transformation is making businesses ever more reliant on interconnected software applications, distributed over both private software defined data centers (SDDCs) and public cloud environments, which is substantially increasing the complexity for deploying, securing and managing these new services. This increased dependence on hybrid cloud magnifies the risk that critical business services may slow down or end up failing without complete visibility across this hybrid environment.

    Speaker

    Photo Speaker Name Profile
    Ray Krug Ray Krug View Profile
  • UEM – A Tolkien Analysis Sean Herbert  |   baramundi software AG   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 12:20 to 12:50

    UEM – A Tolkien Analysis

    A unique look at how Unified Endpoint Management can help you to take back control of your IT environment. Walk with baramundi down the rocky road to Mordor and discover why one ring may have been an issue, but one tool can still rule them all in this Lord of the Rings inspired presentation!

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Istio Microservice Security Rowan Baker   |   ControlPlane  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 12:20 to 12:50

    Istio Microservice Security

    Microservice security is too hard. We must issue and rotate TLS certificates, deploy identity providers, and embed auth logic in applications. These all require secure development, test, and maintenance effort. Istio (a Google, IBM, and Lyft project) offers a new way: by providing a service mesh and a unified identity for each request, it offers all these things with zero application changes.

    Speaker

    Photo Speaker Name Profile
    Rowan Baker Rowan Baker View Profile
  • Modernizing Legacy Applications with Habitat Tom Robinson-Gore  |   Chef   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 12:20 to 12:50

    Modernizing Legacy Applications with Habitat

    Habitat is Automation that travels with the application. Learn how Habitat enables application teams to build, deploy and manage any application in any environments, helping to move existing, business critical apps to modern platforms, and deliver on a cloud-native strategy.

    Speaker

    Photo Speaker Name Profile
    Tom Robinson-Gore Tom Robinson-Gore View Profile
  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop Jamie Sarakinis  |   Securonix   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

    Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable threats is an enormous challenge. Legacy SIEM tools designed 10+ years ago are not architected to scale to handle this massive volume of data, and the rule-based approach used by these SIEMS is not sufficient to detect advanced modern cyber threats.

    Join Securonix to learn about the next-gen approach to security monitoring. The Hadoop platform enables unlimited scale, and machine learning-based analytics enables you to find the needle in the haystack of threats with minimal human intervention.

    Speaker

    Photo Speaker Name Profile
    Jamie Sarakinis Jamie Sarakinis View Profile
  • Workspace Evolution Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 12:20 to 12:50

    Workspace Evolution

    The time to migrate is now! Let us show you how easy it is to integrate on-premises Citrix infrastructures, including Legacy 6.5, with the new Citrix Workspace Platform.

    Speakers

    Photo Speaker Name Profile
    Craig Bramley Craig Bramley View Profile
    Wendy Gay Wendy Gay View Profile
  • Thingbot Apocalypse: How to prepare for IoT attacks David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 12:20 to 12:50

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Don't let BYOD put your whole network at risk Matt Boddy  |   Sophos   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 12:20 to 12:50

    Don't let BYOD put your whole network at risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • Stepping into the cloud with confidence Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 12:20 to 12:50

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • Enabling AI in the Enterprise: Looking Beyond the Algorithms ACCESS PLUS Afraz Jaffri  |   Capgemini  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

    Enabling AI in the Enterprise: Looking Beyond the Algorithms

    When an organisation takes the first steps in AI, much of the attention is focused on finding the right people, platform, tools, frameworks and skills to build out a data science team. Not so much attention is paid to the other parts of the organisation, where AI will actually be deployed. This talk will give some insight on how to setup an enterprise to make the most of AI, from test-and-learn prototypes to delivering substantial business value.

    Speaker

    Photo Speaker Name Profile
    Afraz Jaffri Afraz Jaffri View Profile
  • Smart Buildings and GDPR ACCESS PLUS Sarb Sembhi  |   Virtually Informed  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 12:20 to 12:50

    Smart Buildings and GDPR

    This session will bring together several topics related to Smart Buildings, IoT, Supply chain and GDPR. Anyone responsible for Smart Buildings will have to comply with Data Protection, and not only will they need to comply, but they will need to be able to demonstrate that they comply. Demonstrating compliance with Data Protection in Smart Buildings is a complex process, as it requires compliance in not only selecting vendors who understand security and Data Protection, but also installers, integrators and consultants who also understand their role in compliance. This session will cover the regulatory obligations as well as identify some of the key roles and responsibilities related to Data Protection in Smart Buildings.

    Speaker

    Photo Speaker Name Profile
    Sarb Sembhi Sarb Sembhi View Profile
  • Do I own my land? Myths and opportunities for blockchain in land administration ACCESS PLUS Dave Stow  |   Ordnance Survey  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 12:20 to 12:50

    Do I own my land? Myths and opportunities for blockchain in land administration

    Understanding the ownership of land and property is fundamental to a nation’s economy. However in many parts of the world, ownership is unclear and the processes of registration and conveyance are slow and suffer desperately from corruption. Blockchain has been vaunted as the magic bullet to these problems, but is it? What are the realities, challenges and opportunities of administering land using blockchain? How should we go about moving to using blockchain in a way that adds value?

    Speaker

    Photo Speaker Name Profile
    Dave Stow Dave Stow View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Customer Journey to Cloud Recovery with AWS and Sungard AS Phil Laslett  |   Sungard AS   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:00 to 13:30

    Customer Journey to Cloud Recovery with AWS and Sungard AS

    Whether already using public or private cloud for your business applications or relying on-premises solutions, back-up and an effective recovery is vital to ensuring ‘business as usual’ operation if disaster does strike.
    There are many options available when it comes to recovery, but one of the most effective can be a cloud based solution - regardless of whether your business is already in the cloud or not.

    This session will evidence why a strong Disaster Recovery strategy is critical more than ever today, customer with examples of businesses that have made the decision to embrace cloud recovery.

    We’ll look at how they came about their decision, the benefits it has brought them, and lessons learn for improving resiliency in your organisation whatever stage you are in your Cloud Journey.

    We’ll also look at the AWS Cloud Platform and how Sungard AS can offer Managed, SLA backed seamless recovery both on-premise to AWS or for businesses already in AWS or other cloud environments.

    Speaker

    Photo Speaker Name Profile
    Phil Laslett Phil Laslett View Profile
  • Infrastructure Lifecycle Management – Supporting and protecting your hardware for life through innovation Tech Leaders  |  Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 13:00 to 13:30

    Infrastructure Lifecycle Management – Supporting and protecting your hardware for life through innovation

    This informative session will demonstrate how we have helped organisations with their strategic IT decisions, regardless of their position in the infrastructure lifecycle.

    Whether you require Post-Warranty and End of Service Life support, want to find out more about our proactive maintenance tool utilising the power of AI and DevOps; ParkView, or simply want to understand how we can help you transition to Managed Services and implement an on-premise, off-premise or even a hybrid cloud strategy - we will cover it all in the packed session.

    Speakers

    Photo Speaker Name Profile
    Brett Pytel Brett Pytel View Profile
    Darren Ellis Darren Ellis View Profile
  • Can your WAN keep up? Start delivering uncompromised experiences over any connection. Tech Leaders  |  Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 13:00 to 13:30

    Can your WAN keep up? Start delivering uncompromised experiences over any connection.

    More users, more apps, different devices? Discover how you can reduce WAN operational complexity and deliver secure, high-performance experiences over any type of wide-area network connection with SD-WAN.

    Speakers

    Photo Speaker Name Profile
    Ben Brophy Ben Brophy View Profile
    Robert McGuckin Robert McGuckin View Profile
  • How can an ADC function in a multi cloud world? Andrew Scott  |   Citrix Systems UK Ltd   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:00 to 13:30

    How can an ADC function in a multi cloud world?

    Many enterprise businesses have begun either sourcing applications as a SaaS or migrating applications to the cloud. While on-premises applications have historically benefitted from application delivery controllers (ADCs) such as Citrix ADC to provide increased resilience, performance, and security, once applications move to the cloud, their role becomes more uncertain. How can we address these are new challenges in a hybrid cloud architecture?

    Some of the challenges include:
    Adding automation
    Mitigating outages
    Coping with complexity

    This session will focus on how Citrix Networking delivers in a cloud-first world, using its application-level intelligence and analytics in multi-cloud environments.

    Speaker

    Photo Speaker Name Profile
    Andrew Scott Andrew Scott View Profile
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:00 to 13:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Can you enable SaaS based Line of Business agility, without compromising IT security? Daniel Power  |   OneLogin   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 13:00 to 13:30

    Can you enable SaaS based Line of Business agility, without compromising IT security?

    The objective of this session is enable IT to change managers, and employees, perception of being the department that says No, to the department that says Yes, and we will make everyone’s life easier too!
    Focussing on understanding the challenge of Shadow IT, OneLogin will be looking to how to address these challenges at an organisational and technological level.

    Speaker

    Photo Speaker Name Profile
    Daniel Power Daniel Power View Profile
  • Preparing Digital Operations for Brexit with an Outcome-Led Approach Chris Brain  |   Wunder  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 13:00 to 13:30

    Preparing Digital Operations for Brexit with an Outcome-Led Approach

    You will struggle to find an enterprise-level organisation with international operations that isn’t contingency planning for the potential impact of Brexit right now.

    When preparing for change (digital or otherwise) during times of uncertainty, the biggest questions are “where do we start” and “how do we move forward?” Wunder’s experience has proven, time and time again, that focusing on outcomes first is the answer.

    In this session, Chris Brain shows how an outcome-led approach successfully helped a large, complex organisation with international reach prepare their digital operations for the potential effects of Brexit in just a few weeks.

    Speaker

    Photo Speaker Name Profile
    Chris Brain Chris Brain View Profile
  • A new Era of Cybersecurity Attacks Ross Laing  |   Bitdefender   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:00 to 13:30

    A new Era of Cybersecurity Attacks

    An increase in sophisticated cyber-attacks worldwide in 2017 created a turbulent market. In most cases, company’s endpoints remained the main target for attackers looking to obtain a foothold into the corporate network. Faced with an increasing wave of sophisticated and elusive attacks, companies have started to pay more attention to security risks, focusing both on operational security practices, as well on strengthening their last mile of surface attacks with investments in security technologies able to address the new risks imposed by the changing nature of attacks.

    Speaker

    Photo Speaker Name Profile
    Ross Laing Ross Laing View Profile
  • GDPR – Where do we go from here? Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 13:00 to 13:50

    GDPR – Where do we go from here?

    It’s almost 5 months since the GDPR came into force and so where are we now?  Joanne will take a practical look at what has happened in the last 5 months and what happens next with GDPR including: where has the ICO been active so far, what issues are businesses facing, how to deal with the deluge of data processing addendums and what is the position with the next wave of privacy legislation.

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Confessions of a Hacker – Under the Hoodie Samantha Humphries  |   Rapid7  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:00 to 13:30

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • DNS Tunneling and Exfiltration Kevin Piper  |   Verisign  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:00 to 13:30

    DNS Tunneling and Exfiltration

    Hiding in plain sight, the use of DNS, a critical component of online communication, is being leveraged by hackers for malicious activities such as stealing your data, delivering malicious payloads to your systems, and probing you network for vulnerabilities.  

    DNS tunneling and exfiltration present potent threats to data security, which can be extremely difficult to detect if your organization lacks security solutions designed to spot and mitigate them.  By understanding and implementing solutions to combat DNS tunneling and exfiltration, you can keep your organization secure.

    Speaker

    Photo Speaker Name Profile
    Kevin Piper Kevin Piper View Profile
  • Seeing but not observing – the clear distinction between IoCs and TTPs Richard Cassidy   |   Exabeam  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 13:00 to 13:30

    Seeing but not observing – the clear distinction between IoCs and TTPs

    Organisations need new strategies for detecting advanced attacks.  While discovering Indicators of Compromise (IoCs) is necessary, more focus is needed on Tools, Techniques and Procedures (TTPs) as attackers turn to sophisticated automation, constantly evolving their methods to avoid detection.  
     
    In this session, Exabeam’s Director of Sales Engineering, Richard Cassidy, will explain why IOC’s have become a red herring in security investigation and response, as traditional SIEM technologies struggle to make sense of where critical risks lay.
     
    By breaking down the broad anatomy of an attack – by dissecting a well know APT groups TTP’s – Richard will demonstrate how to uncover and identify the most sophisticated attack patterns targeting organisations today.  He will discuss why the traditional SIEM and IoC correlation approaches are adding to the alert and incident investigation fatigue that many organisations are battling today, and why analytics – in tandem with SIEM – provides a much needed new perspective on threat, compliance and risk activity management.

    Speaker

    Photo Speaker Name Profile
    Richard Cassidy Richard Cassidy View Profile
  • Thu 4th Oct 13:40 - 14:10
  • Bringing Enterprise to the Blockchain - Moving from Science Experiment to Practical Business Mainstream
    James Allerton-Austin  |   Oracle   |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Bringing Enterprise to the Blockchain - Moving from Science Experiment to Practical Business Mainstream

    Blockchain is one of the most popular talking points in the IT industry today, with thousands of technical proofs, use-cases and experiments being planned and delivered to show the value of this technology. For all of this, when asked about production deployments of blockchain for the real enterprises of today, most of the proponents of this value will demur when it comes to talking production. Bridging this gap between science experiment and an enterprise quality platform for the modern business requires a great deal of work, much of which is done by the growing community of vendors who are collaborating to deliver not just the technical requirement and use-case solutions for blockchain, but also the practical tools to use blockchain in a meaningful way within a business. join this session to hear about the 5 key qualities that any practically usable enterprise blockchain will need to deliver and how the collaboration of enterprise vendors is making the practical use of Blockchain a reality for organisations in 2018.

    Speaker

    Photo Speaker Name Profile
    James Allerton-Austin James Allerton-Austin View Profile
  • Real cases of social engineering: hackers, competitors and insiders Lisa Forte  |   Red Goat Cyber Security LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Real cases of social engineering: hackers, competitors and insiders

    Social engineering can range from a simple phishing email to a prolonged campaign to turn one of your employees into a malicious insider. Lisa will share some interesting cases she has worked on involving large organisations that have been attacked through social engineering by both malicious actors and competitors. She will detail how the process works, what to look out for when it comes to insider threats and how cyber organised crime groups are trading in fake social media profiles.

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Secure SDN for Enterprises Margarida Correia  |   Juniper Networks  |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:40 to 14:10

    Secure SDN for Enterprises

    Many Enterprises IT departments want to deploy Hybrid-cloud and Multi-cloud environments to become more agile and achieve increasingly demanding business outcomes.
        
    By distributing workloads across public and private/on-prem clouds and extending network connectivity to existent Data Centers, companies can benefit from the best features of cloud as well as coping with existent vast amount of applications on legacy Data Centers.
        
    However, a key problem in this type of new ecosystem is complying with required network security policies. In this presentation, we show how enterprises network security requirements can be addressed in hybrid and multi-cloud environments. We also consider deployment strategies for SDN security in brownfield scenarios.

    Speaker

    Photo Speaker Name Profile
    Margarida Correia Margarida Correia View Profile
  • How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen! Adam Shillcock  |   Datto   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 13:40 to 14:10

    How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen!

    Are you sick and tired of liquid nitrogen freezing your servers and plunging your business into downtime? Do sub-zero temperatures destroy your data, cool your customers and put a crack in your profits?! Yep, we thought so. Come along to our session and see how we recover a ransomware-infected, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSPs and we have the answers you need! Wrap up warm: this is a demo you won’t want to miss!

    Speaker

    Speaker Name Profile
    Adam Shillcock View Profile
  • App Virtualization and Mobile Workspace John Moody  |   Citrix Systems UK Ltd   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 13:40 to 14:10

    App Virtualization and Mobile Workspace

    We’ve all virtualised our apps, and made all our workspaces mobile haven’t we? Has Citrix made the humble pen and paper a thing of the past? Let’s discuss...

    Speaker

    Photo Speaker Name Profile
    John Moody John Moody View Profile
  • The Rise of Collaborative Communications Sahil Rekhi   |   RingCentral   |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 13:40 to 14:10

    The Rise of Collaborative Communications

    The speed and sheer volume of communication channels is greater than at any point in history. This evolution is helping to foster better ways of working and innovative new business models. Sahil Rekhi, Managing Director, EMEA for RingCentral offers a candid presentation that explores trends, benefits and potential pitfalls offered by the rise of collaborative communication. Backed up by insights from a new UK survey of communication and application use by UK business, the session examines collaboration from both an IT and end user perspective to help organisations gain maximum benefit.

    Speaker

    Photo Speaker Name Profile
    Sahil Rekhi Sahil Rekhi View Profile
  • Beyond the Firewall: Protecting Your DNS Nick Fennell  |   EfficientIP  |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 13:40 to 14:10

    Beyond the Firewall: Protecting Your DNS

    We live in a hyper-connected world, which suffers from an extremely dynamic threat environment. DNS is critical for users anywhere to access apps and services, and it has become a primary target as well as an assault vector for hackers. Learn why traditional security solutions don't work for DNS, how exfiltration and other DNS-based attacks are carried out, as well as best practices and new technology integrations to mitigate assaults and protect your business and data.

    Speaker

    Photo Speaker Name Profile
    Nick Fennell Nick Fennell View Profile
  • Intent-Based Application Services: Intelligence and Elasticity Across Any Cloud. James Sherlow  |   Avi Networks   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:40 to 14:10

    Intent-Based Application Services: Intelligence and Elasticity Across Any Cloud.

    Enterprises are adopting multi-cloud strategies as springboards to increased business agility and competitive differentiation. Elastic, highly-automated application networking services such as load balancing, application monitoring, application acceleration, auto-scaling, micro‑segmentation, and application security, are essential components to deliver this agility.

    For years, enterprises have relied on appliance-based (hardware or virtual) load balancers. Unfortunately, these legacy ADCs are very inflexible at scale and slow to respond to changes or security incidents. These problems are amplified as applications migrate to the cloud.

    In contrast, the Avi Vantage Platform not only elastically scales up and down based on real-time traffic patterns, but also offers ludicrous scale at a fraction of the cost. Learn how Avi can scale up and down quickly across any cloud.

    Speaker

    Photo Speaker Name Profile
    James Sherlow James Sherlow View Profile
  • Scaling DevOps Jon Hammant  |   Accenture  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 13:40 to 14:10

    Scaling DevOps

    The session will give details on approaches to Scaling Agile and DevOps across a large-scale organisations. We’ll run through details of the approach that has been used internally within Accenture to enable the support of a 450,000 person delivery organisation as we’ve moved to an Agile/DevOps focused company. In addition, we’ll run through the options available to create your own DevOps platform and the work that we’ve Open Sourced to help kickstart organisational journeys.

    Speaker

    Photo Speaker Name Profile
    Jon Hammant Jon Hammant View Profile
  • Threat Intelligence with ShadowSearch Rose Bernard  |   Digital Shadows  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    Threat Intelligence with ShadowSearch

    Following the takedown of Alphabay and other high profile criminal marketplaces in July and August 2017, the cybercriminal ecosystem has changed and developed in a number of ways, shifting to smaller, trusted groups and peer-to-peer communications over the wide catch-all style marketplaces. In this presentation we look at how this shift and the subsequent professionalisation and specialisation or the deep and dark web has changed the threat landscape, the consequences for companies and individuals, and how Digital Shadows analysts navigate the new ecosystem.

    Speaker

    Photo Speaker Name Profile
    Rose Bernard Rose Bernard View Profile
  • To Trust Or Not To Trust…A Risk-Based Approach To Cyber Defence David Higgins  |   CyberArk  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 13:40 to 14:10

    To Trust Or Not To Trust…A Risk-Based Approach To Cyber Defence

    Hacking has proven a relatively risk-free way to obtain sensitive data and IP in recent years, with attackers able to lurk for months on networks, conducting essential surveillance and compromising the credentials they need to move laterally before launching their endgame – whatever that might be. We don’t necessarily lack visibility of what is going on in our networks but we certainly lack the ability to tell whether what is going on is something that can be trusted…or something that needs attention. This session will cover how to correctly apportion risk to network activity by focusing on managing and securing the credentials that allow access to critical assets. It will argue that it is crucial to identify what is truly necessary to secure and to implement a strategy to support this that provides a defensible ROI argument.  

    Speaker

    Photo Speaker Name Profile
    David Higgins David Higgins View Profile
  • How would you find out if a supplier breached your data? Jeremy Hendy  |   RepKnight   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:40 to 14:10

    How would you find out if a supplier breached your data?

    We all use tens or hundreds of third-party suppliers to store and process our data. Whether it’s your CRM, HR software, payroll, training and pension companies, your corporate data has already left the building. And as we’ve seen with many high-profile businesses like Ticketmaster, a third-party data breach can quickly cause major reputational & financial damage to your business. But how do you look after your data when it’s outside your network?

    This presentation outlines simple steps for Data Breach Detection, ensuring you're the first to find out when your data is leaked, hacked, or sold on the Dark Web. In a post-GDPR world, Data Breach Detection could save you millions.

    Speaker

    Photo Speaker Name Profile
    Jeremy Hendy Jeremy Hendy View Profile
  • Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan Ari Eitan  |   Intezer   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:40 to 14:10

    Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan

    In the software development world, engineers frequently use ready-made code for various tasks. On the darker side of things, malware authors follow in the same path, why write your own code when existing code is prevalent and easy to use. A phenomenon that we see time and time again and one that proves beneficial in detecting malicious intent, if understood correctly.

    In this session we will demonstrate how finding code reuse of known malware with Intezer Analyze enables you to improve malware detection and analysis.

    Speaker

    Photo Speaker Name Profile
    Ari Eitan Ari Eitan View Profile
  • Smart Cities collaboration on public services ACCESS PLUS John David  |   Amnick  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 13:40 to 14:10

    Smart Cities collaboration on public services

    This session will cover how through collaboration local authorities can reduce their spend, create more effective public services, and work towards a better business architecture design. John David will use examples of this can be achieved primarily through collaboration but also ensuring citizens are central to this.

    The Challenges

    • Sharing Culture
    • Political barriers
    • Short-termism mentality

    The Opportunities

    • Innovation
    • Reduce costs
    • Technologies – Digital, IoT, 5G, AI
    • Data

    Speaker

    Photo Speaker Name Profile
    John David John David View Profile
  • Blockchain Bulls**t ACCESS PLUS Tazz Gault  |   State Zero  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 13:40 to 14:10

    Blockchain Bulls**t

    Blockchain does not just mean cryptocurrency. In fact, in this presentation, we’re not interested in crypto at all.
    Armed with some really awesome case studies (and some pretty poor ones), Tazz Gault, Co-Founder of State Zero – the world’s first dedicated Blockchain Lab for startups – will hopefully help bust a myth or two from this space.
    Join to discover whether the latest buzzword, blockchain, is relevant for your business, as we call bullsh*t on much of the current views.

    Speaker

    Photo Speaker Name Profile
    Tazz Gault Tazz Gault View Profile
  • Why All Behaviours And Emotions In Your Network Today Are Important To Understand Harry Tinson  |   HANDD Business Solutions   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:40 to 14:10

    Why All Behaviours And Emotions In Your Network Today Are Important To Understand

    If someone is on your network you should assume they’re in it.

    In a digitally changing world, a dynamic approach to security is something to be desired. The best malware behaves like a human – humans are vulnerable and unpredictable – not predictable strings of 1’s and 0’s.

    During this session Harry will run through user cases worked on with large organisations, outlining how data security has developed from a CISO’s chore into a strategic state of mind across the whole organisation.

    Speaker

    Photo Speaker Name Profile
    Harry Tinson Harry Tinson View Profile
  • Helping your organisation become data-driven ACCESS PLUS Ade Adewunmi  |   Teradata  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    Helping your organisation become data-driven

    Becoming a data-driven organisation doesn’t happen overnight and yet that’s what organisational leaders are often asked to do. Working out how to responsibly extract value from your organisation’s existing data assets isn’t always a straightforward process, neither is assembling the skills, processes and infrastructure. This is especially the case when both the data and infrastructure are distributed across the organisation.
     
    In this session Ade provides leaders with a framework for working these things out. Her talk also focuses on the realities of delivering these data strategies, she covers pitfalls to watch out for as well as effective ways of making the case for investment, for example, the delivery of business cases.  The aim of this session is to help leaders tasked with guiding their organisations towards a data-driven future feel better equipped to do that.

    Speaker

    Photo Speaker Name Profile
    Ade Adewunmi Ade Adewunmi View Profile
  • Monitoring Applications, Infrastructure Cloud & Containers - why you need less metrics, more insight Justyn Roberts  |   Instana   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 13:40 to 14:10

    Monitoring Applications, Infrastructure Cloud & Containers - why you need less metrics, more insight

    Instana has a simple goal, make life easier for DevOps. DevOps teams have a hard problem! Keeping applications running perfectly is not an easy task in this world of agile development, continuous delivery, amazing scale and the ever increasing complexity of information systems architecture.

    Application Performance Management (APM) has become a key element to achieving performance and availability of business-critical applications. Around 2005-2008, a second generation of APM tools were introduced built for monitoring service-oriented architectures (SOA), In this talk I will discuss the best practices when it comes to Monitoring Applications, Infrastructure Cloud & Containers.

    Speaker

    Photo Speaker Name Profile
    Justyn Roberts Justyn Roberts View Profile
  • Thu 4th Oct 14:00 - 14:50
  • How safe is your Password? Next Generation Authentication and E-Signature Dan McLoughlin  |   OneSpan  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 14:00 to 14:50

  • Thu 4th Oct 14:20 - 14:50
  • Local authorities – The Digital Maze (where are we?)
    John David  |   Amnick  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Local authorities – The Digital Maze (where are we?)

    Amnick are presenting their national research exclusively at this event. This research focussed on 2 main questions shown below – with 116 UK local authorities.    

    Is your local authority developing/creating Tech solutions (e.g. Demonstrator projects/ Accelerator projects)? To support future service delivery.

    Values of the work

    • Types of solutions being worked upon
    • Are these scalable?
    • How/where is this being funded from

    Digital Transformation

    • Have you started the journey?
    • What are your current successes?
    • What technologies are working best for you

    This session will be articulating at high level of the current status amongst these 116 authorities. This is a large-scale study done primarily by contacting these authorities and questionnaires.

    Speaker

    Photo Speaker Name Profile
    John David John David View Profile
  • Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud Siân John  |   Microsoft  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud

    Digital transformation drives business critical workloads to the cloud, it’s also driving traditional cybersecurity operations managers a little nuts. Harnessing the law of data gravity is a promising path forward for cyber defence and response. This talk will propose a new model that replaces the old school SIEM enabling SOC teams to focus on intelligent automation and security decision making where context and integration from data gravity is most abundant. This session will outline how the law of data gravity can be applied to security and demonstrate some first steps toward a new SOC / cyber defence model for 2020 and beyond

    Speaker

    Photo Speaker Name Profile
    Siân John Siân John View Profile
  • Moving to a Business-Driven Network Model Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 14:20 to 14:50

    Moving to a Business-Driven Network Model

    Go Beyond the ‘Software-Defined Network’and move to a‘Self Driving Network’. Tell the network what the business wants, then use automation and machine learning to just make it work!

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Data Centre Networking at 100Gb/s and Higher Steve Jarman  |   Spirent Communications  |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 14:20 to 14:50

    Data Centre Networking at 100Gb/s and Higher

    The entire bandwidth of the Internet of the late 1990s can now be handled by a single data centre switch! This is a time of unprecedented change in networking. 100G Ethernet has been deployed in larger data centres for a number of years and thoughts are now turning to 400G and beyond. The proliferation of virtual servers and east-west traffic within data centres is driving new control-plane technologies such as VXLAN, eBGP and EVPN. This session will examine the networking technologies and testing of the modern data centre, looking at how lessons learned from 100G deployments can inform future strategies.

    Speaker

    Photo Speaker Name Profile
    Steve Jarman Steve Jarman View Profile
  • Creating the ultimate digital workspace end-user experience Nikkie Spencer  |   Direct Line Group  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 14:20 to 14:50

    Creating the ultimate digital workspace end-user experience

    Nicola explores and talks about some of the common business challenges when addressing end user experience management & digital transformation. She’ll explain how it’s become necessary to not only measure but be able to analyse client-side performance ensuring the best possible experience for users. DLG will elaborate on how they’ve been able to resolve a number of major incidents in just hours, helping to eliminate inefficiencies whilst making the necessary service improvements to enable informed decision making for positive on-going change.

    Speaker

    Photo Speaker Name Profile
    Nikkie Spencer Nikkie Spencer View Profile
  • Microsoft Teams, The Future of Collaboration and Telephony in Office 365? Tom Arbuthnot  |   Modality Systems  |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 14:20 to 14:50

    Microsoft Teams, The Future of Collaboration and Telephony in Office 365?

    Over 125,000 enterprises already use Microsoft Teams. Available to 181 markets with global PSTN Telephony and Conferencing, Teams is a chat-centric collaboration tool that brings together all the services in Office 365 to allow business to operate more efficiently and effectively.

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Cloud in the Spotlight: How a National Institution ripped up the rule book with its Cloud Transformation George Tunnicliffe  |   National Theatre  |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 14:20 to 14:50

    Cloud in the Spotlight: How a National Institution ripped up the rule book with its Cloud Transformation

    As part of the National Theatre’s move to the cloud, the Operations Team looked to see what else they could do differently. Talking about embracing the change, George Tunnicliffe speaks about the culture, maximising the benefits of the change and creating a new delivery model for the team. With real-world examples and some of those lessons learned, this talk is part story, part informational and all actual about doing things differently and learning along the way!

    Speaker

    Photo Speaker Name Profile
    George Tunnicliffe George Tunnicliffe View Profile
  • Morality and Ethics - Caring is Everything Sam Warner  |   Black Pepper Software Ltd.  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 14:20 to 14:50

    Morality and Ethics - Caring is Everything

    In software development, caring is everything. Of late, we've seen a wave of unethical tech plague our industry in ways we'd never thought it could. Are we just guns-for-hire developers? How do we prevent unethical technology spreading (and being made)?

    Spoiler: Awareness and diversity are key...

    Speaker

    Photo Speaker Name Profile
    Sam Warner Sam Warner View Profile
  • Evolve Your Identity Strategy for Digital Transformation Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 14:20 to 14:50

    Evolve Your Identity Strategy for Digital Transformation

    Homegrown, manual identity and access management (IAM) systems are no longer sufficient for digital businesses. Trends in customer experience, cloud-based services, regulation compliance and security are among many factors driving businesses toward a more comprehensive customer IAM strategy. This is a significant shift from IAM’s original purpose, which focused primarily on employee access and compliance objectives.

    Speakers

    Photo Speaker Name Profile
    Neill Brookman Neill Brookman View Profile
    Todd Etchieson Todd Etchieson View Profile
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Kevin Kiley  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 14:20 to 14:50

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Kevin Kiley Kevin Kiley View Profile
  • Scoping infections and disrupting breaches with Splunk Greg Wiley  |   Splunk, Inc.   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 14:20 to 14:50

    Scoping infections and disrupting breaches with Splunk

    Infection and exploits will occur. The new goal is to prevent those infections from becoming a data breach. To do this successfully, security analysts need the ability to continuously collect, analyze, correlate and investigate a diverse set of data.
    Listen to this session to hear the specific data sources and capabilities required to determine the scope of an infection before it turns into a breach. See a live incident investigation that demonstrates this approach.

    Speaker

    Speaker Name Profile
    Greg Wiley View Profile
  • Pathway to the Future of Security & SD-WAN David van Schravendijk  |   Cisco Meraki   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 14:20 to 14:50

    Pathway to the Future of Security & SD-WAN

    SaaS applications are straining existing network infrastructure and cybersecurity threats are consistently evolving. Learn how a network can be re-architected to prepare for the upcoming digital transformation using simplicity. Security & SD-WAN can be delivered together intuitively and effectively.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
  • AI like an Expert ACCESS PLUS Jon McLoone  |   Wolfram Research  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 14:20 to 14:50

    AI like an Expert

    New machine learning techniques have burst on to the scene in recent years making some remarkable predictive models possible. However, with the newness of much of this technology, there is a limited supply of experts capable of wielding the new tools.
     
    Like any technology there will be a drive to automate and make the capabilities accessible to more people, and eventually consumers.
     
    Wolfram is leading the charge in automating AI, this talk will show some of the steps taken to make AI into just another tool for everyday data science and how anyone who has a basic knowledge of coding and an interest in the concepts of AI can already achieve significant results. Examples shown will include computer vision, audio analysis, and behaviour prediction.

    Speaker

    Photo Speaker Name Profile
    Jon McLoone Jon McLoone View Profile
  • Developing Blockchain Workforce ACCESS PLUS Irene Dima  |   EC-Council  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 14:20 to 14:50

    Developing Blockchain Workforce

    While organizations are now exploring the in-depth the potential of Blockchain Technology, they also face several challenges in adopting and scaling blockchain-powered solutions across different operations. Many of these technologies have been tested in specific use cases only and considered unready for large-scale commercial implementation. In addition to that, questions now arise that the so-called unhackable blockchain technology could be threatened by the emergence of quantum computers. To address regulatory and reputational risk as well issues of  unfamiliarity, lack of knowledge, and lack of experience, organizations need to develop and retain internal blockchain talent.

    Speaker

    Photo Speaker Name Profile
    Irene Dima Irene Dima View Profile
  • Providing the best experience to users: Delivering content the cloud way Jason Poole  |   Citrix Systems UK Ltd   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 14:20 to 14:50

    Providing the best experience to users: Delivering content the cloud way

    Join us to understand how Citrix uses network transactions to create a real-time map of user experience across the whole internet and how this can be used to route users to your content in a way that meets your business requirements.

    Speaker

    Photo Speaker Name Profile
    Jason Poole Jason Poole View Profile
  • The State of Your Supply Chain Andrew Martin  |   ControlPlane  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 14:20 to 14:50

    The State of Your Supply Chain

    Container security often focuses on runtime best-practices whilst neglecting the software shipped in the supply chain. Application or library vulnerabilities are a likely route to data exfiltration, and containers offer a new opportunity to mitigate this risk.

    Treating containers as immutable artefacts allows us to "upgrade" images by rebuilding and shipping whole images, avoiding configuration drift and state inconsistencies. In this talk we detail an ideal software supply chain, describe the current state of the ecosystem, and dig into specific tools. Grafeas, Kritis, in-toto, Clair, Micro Scanner, TUF, and Notary are covered with background and demos.

    Speaker

    Photo Speaker Name Profile
    Andrew Martin Andrew Martin View Profile
  • Thu 4th Oct 15:00 - 15:50
  • PANEL: IP EXPO Bytesize - The Year Ahead Panel  |  Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 15:00 to 15:50

    PANEL: IP EXPO Bytesize - The Year Ahead

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field will each share a ten minute bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees, plus our social followers, will have the opportunity to ask their questions to the panel in an extended Q&A.

    The four topics in this instance are Smart Cities, Data Driven, GDPR and Data Breaches.

    Speakers

    Photo Speaker Name Profile
    Ade Adewunmi Ade Adewunmi View Profile
    Barry Lyne Barry Lyne View Profile
    Kevin Kiley Kevin Kiley View Profile
    Paul Adams Paul Adams View Profile
  • Is your Board of Directors Cyber-Ready? Georgie Collins  |   Irwin Mitchell LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 15:00 to 15:30

    Is your Board of Directors Cyber-Ready?

    A primary responsibility of every board of directors is to secure the future of the company.  The overwhelming number of cyber incidents has escalated the issue of cybersecurity to being on the shortlist of organisation’s risk portfolio and board’s crucial responsibilities.  Against a backdrop of increasing pressure from regulators and ongoing cyber-attacks, board directors have a critical role to play to ensure proper oversight of cyber risks for their companies. Directors need to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue.

    Speaker

    Photo Speaker Name Profile
    Georgie Collins Georgie Collins View Profile
  • The Rise of the Private Cloud Dr. Jai Menon  |   Cloudistics   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 15:00 to 15:30

    The Rise of the Private Cloud

    Dr Jai Menon discusses the approaches to cloud adoption and why companies are moving their focus to the consumption experience of operating a private cloud, discovering the benefits of digital transformation and repatriation.

    Speaker

    Photo Speaker Name Profile
    Dr. Jai Menon Dr. Jai Menon View Profile
  • Cloud Blind-Spots: Illuminate Every Network with ThousandEyes Ian Waters  |   ThousandEyes   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 15:00 to 15:30

    Cloud Blind-Spots: Illuminate Every Network with ThousandEyes

    For most companies the cloud is now part of their wide area network, whether it's employee apps accessed via the major cloud providers or migrating their own applications to cloud based platforms. The challenge is that the public internet and cloud provider networks are invisible for most organisations, so if there's a problem, what happens? ThousandEyes provides visibility into all networks, including the ones you don't own; it's monitoring, just for the cloud era. To find out more and see ThousandEyes in action come and check out our session.

    Speaker

    Photo Speaker Name Profile
    Ian Waters Ian Waters View Profile
  • Digital Transformation – “Yes that is impressive, but couldn’t you just use a pencil…?” Adam Worthington  |   Ethos Technology   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 15:00 to 15:30

    Digital Transformation – “Yes that is impressive, but couldn’t you just use a pencil…?”

    The rewards offered by digital transformation are huge, but so are the potential pitfalls. During this session Adam will outline some techniques for building an adaptable infrastructure framework; drawing on his own experience, and insights gleaned from the journeys of companies such as Google and Amazon. He will discuss the importance of asking “why” before “how”, and how to solve problems today without creating new ones in the future.

    If you’re struggling to navigate a sea of cloud-first, software-defined everything, containers, XaaS etc. then Adam’s ability to simplify the complex make this one a must.

    Speaker

    Photo Speaker Name Profile
    Adam Worthington Adam Worthington View Profile
  • How Client-Side Application Shielding Can Tackle Fraud and Detect Tampering On Your Website Carlos M. Gonçalves  |   Jscrambler  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 15:00 to 15:30

  • The Role of Threat Hunting in Breach Prevention and Compliance Daniel Alexander Shepherd  |   Agile Response Technologies A/S  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 15:00 to 15:30

    The Role of Threat Hunting in Breach Prevention and Compliance

    Threat Hunting is an emerging discipline that aims to reduce companies' "time to detection". This seminar aims to provide an integrated view of hunting applied to both threats and risks, as applied to breach prevention and compliance-oriented processes, exploring themes around why this should be a priority activity for any organisation and how it should be done to maximise effectiveness and quality of remediation decisions.

    Speaker

    Photo Speaker Name Profile
    Daniel Alexander Shepherd Daniel Alexander Shepherd View Profile
  • Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected Richard Flanders  |   Check Point Software Technologies  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 15:00 to 15:30

    Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected

    Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.

    Speaker

    Speaker Name Profile
    Richard Flanders View Profile
  • How behavioural science is being successfully employed to encourage sustainable behaviour ACCESS PLUS Yolanda Berry  |   UK Behavioural Economics  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 15:00 to 15:30

    How behavioural science is being successfully employed to encourage sustainable behaviour

    Every day, we are faced with thousands of decisions. Some of them are trivial, like what to wear or eat, while others are critical, like which medical treatment to undergo or which job to take. But all of them contributed to our overall cognitive load, and the resulting decision fatigue is one of the things that makes it so hard for people to adopt sustainable behaviour. In this talk, Yolanda will explain what we currently understand about how humans make decisions, and how we are applying that understanding to help reduce our impact on the environment. The session will include case studies from the UK and abroad, as well as some guidelines on how people use these same techniques in their own work.

    Speaker

    Photo Speaker Name Profile
    Yolanda Berry Yolanda Berry View Profile
  • The Democratization of Machine Learning ACCESS PLUS Omer Mahmood   |   Google  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 15:00 to 15:30

    The Democratization of Machine Learning

    Artificial Intelligence has the potential to change how almost every industry operates, but to be able to scale for rapid adoption, it needs to be universally accessible and useful. Democratizing AI is one way to do this — publishing the technology to the world through APIs can expose the power of AI to any application. APIs will allow applications to go from transact to adapt, from purely transactional to the ability to evolve accordingly to data changes. In this session, Google Cloud Machine Learning Customer Engineering Manager Stefan Ebener will help attendees better understand the capabilities and opportunities of AI. Pointing to advancements such as Google’s Tensor-Processing Unit (TPU), Auto ML and AlphaGo, Ebener will dive into this fundamental shift in technology.

    Speaker

    Photo Speaker Name Profile
    Omer Mahmood Omer Mahmood View Profile
  • No Walls: The Future of Enterprise Security with Zero-Trust Networks Josh Green  |   Duo Security  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 15:00 to 15:30

    No Walls: The Future of Enterprise Security with Zero-Trust Networks

    Just as we stopped using walls to protect our physical cities when they became ineffective, we must now confront the reality that perimeter-based network security is reaching the end of its effectiveness. The approach going forward is zero-trust networks. Join us to learn about what they are, and how Duo can partner with organisations to save money, reduce complexity, and enter the future.

    Speaker

    Photo Speaker Name Profile
    Josh Green Josh Green View Profile
Top