Event starts in...

  

   



  

  



Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Advanced Search
All109
  • Wed 26th Apr 09:30 - 10:30
  • THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It Add to Schedule Kevin Mitnick  |   Mitnick Security Consulting  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 09:30 to 10:30

    THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It

    People are the weakest security link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. Kevin Mitnick will entertain and educate you by performing his "live technology magic show" of the latest hacking techniques. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."
     
    Social engineering is a technique used by hackers and con artists that leverages your tendency to trust. Trust is a truly noble human characteristic; however, in terms of personal and organizational security, it’s also a significant weakness because trust can be exploited. Kevin is the worldwide authority on social engineering and constantly improves and updates this highly acclaimed "security awareness" presentation with the latest threats and risks most people don’t even know exist.
     
    You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

    Speaker

    Photo Speaker Name Profile
    Kevin Mitnick Kevin Mitnick View Profile
  • Wed 26th Apr 11:00 - 11:30
  • The more things change, the more they stay the same for backup! Add to Schedule Stephen Macpherson  |   Macrium Software   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 11:00 to 11:30

    The more things change, the more they stay the same for backup!

    Stephen will go through the results of our recent market research as we discovered some honest views on cloud backup, whether respondents are still utilising a belts and braces approach to backup and just how often do people run a test restore?!

    Stephen will then run through all the latest updates to Macrium Reflect and what you can expect to see in the near future!

    Speaker

    Photo Speaker Name Profile
    Stephen Macpherson Stephen Macpherson View Profile
  • Network Access Case Studies: From Chronic Pain to Effortless Control Add to Schedule
    Alexandra Gates  |   Aerohive Networks Europe Ltd   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 11:00 to 11:30

  • Brought to you by Puppet Add to Schedule
    Peter Souter  |   Puppet   |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 11:00 to 11:30

    Speaker

    Speaker Name Profile
    Peter Souter View Profile
  • Find out how security from the hypervisor layer offers unprecedented visibility into how guest operating systems and VMs operate. Add to Schedule
    Liviu Arsene  |   Bitdefender   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 11:00 to 11:30

    Find out how security from the hypervisor layer offers unprecedented visibility into how guest operating systems and VMs operate.

    A well-known problem in the cyber-security industry is that advanced malware attacks manage to evade traditional in-OS security. This happens because sophisticated malware like APTs executes in the same context and with the same privileges as anti-malware software. Hypervisor introspection ensures that the anti-malware software can live outside of the monitored guest, without relying on functionalities that can be rendered unreliable by advanced malware - no agent or any other type of special software needs to run inside the guest.

    Speaker

    Photo Speaker Name Profile
    Liviu Arsene Liviu Arsene View Profile
  • The State of Malware Add to Schedule Mark Phillips  |   Malwarebytes  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 11:00 to 11:30

    The State of Malware

    Cyberattacks and cybersecurity, or a lack thereof, has grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election last year. But how serious is this issue in the UK and what are the malware variants that pose the most threat to organisations today.

    Speaker

    Photo Speaker Name Profile
    Mark Phillips Mark Phillips View Profile
  • Brought to you by Cisco Umbrella Add to Schedule
    Rob Gregg  |   Cisco Umbrella   |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Apr 11:00 to 11:50

    Speaker

    Photo Speaker Name Profile
    Rob Gregg Rob Gregg View Profile
  • Wed 26th Apr 11:40 - 12:10
  • Digital Transformation and You Add to Schedule James Akrigg  |   Microsoft Ltd  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 11:40 to 12:10

    Digital Transformation and You

    "Technology alone does not transform businesses, people do!" In this session learn about how Digital Transformation is enabling people to change the way they work to drive significant change in business outcomes. You will see examples of how Machine Learning is ushering in AI (not artificial intelligence) but Assistive Intelligence to enable you to achieve greater productivity and how Microsoft is driving technology advances to enable businesses of all sizes.

    Speaker

    Photo Speaker Name Profile
    James Akrigg James Akrigg View Profile
  • RansomWARe, what is it good for? Absolutely Nothing! Add to Schedule Michael Cade  |   Veeam   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 11:40 to 12:10

    RansomWARe, what is it good for? Absolutely Nothing!

    Media coverage on the various versions of encryption Trojans is coming thick and fast. These threats are used to extort money out of the infected, hence the name 'ransomware'.

    To reliably protect critical workloads and data within your environment, the “1” in the 3-2-1 rule continues to play a very important role. 3 copies of your data should be saved on 2 different media and 1 copy should be offsite.

    This session will discuss the preventative actions you can take against ransomware attacks and also explain how Veeam can be used to remediate if you are affected by ransomware.

    Speaker

    Speaker Name Profile
    Michael Cade View Profile
  • Multi-Cloud - Practical Use Cases Add to Schedule Sean McAvan  |   Navisite   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 11:40 to 12:10

    Multi-Cloud - Practical Use Cases

    As one of the hottest trends in the cloud and IT industry, an increasing number of organisations are turning to a multi-cloud approach to take advantage of the strengths of different cloud platforms. With a multi-cloud strategy, businesses can pick and choose the platform and service offering from their provider that best fits the requirement of each process or business unit – and integrate those services – with the option to retain legacy systems in-house, in a hybrid best-fit environment.
     
    Join my seminar to hear some real world use cases of the multi-cloud approach.

    Speaker

    Photo Speaker Name Profile
    Sean McAvan Sean McAvan View Profile
  • Infinite Data-Driven Possibilities through an Empowered Culture Add to Schedule Tech Leaders  |  IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Wed 26th Apr 11:40 to 12:10

    Infinite Data-Driven Possibilities through an Empowered Culture

    From 'Ward to Board' the WWL NHS Trust has proved how it is possible to create and engage a data-driven culture with analytics and insight. This enables WWL NHS Trust to help staff deliver 'patient first' care in real-time with the ability to interact with data and predict activity, trends and possible outcomes.

    This presentation will detail how their Data and Analytics (BI) approach, utilising Qlik, has not only transformed them as an NHS organisation creating over £1 million pounds in efficiency savings & increased productivity, but how this success and learning could be replicated in any organisation or sector.

    Speakers

    Photo Speaker Name Profile
    Mark Singleton Mark Singleton View Profile
    Robbie Evason Robbie Evason View Profile
  • DevOps In The Public Cloud To Acclerate Delivery & Innovation Add to Schedule
    Benjamin Wootton  |   Contino  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 11:40 to 12:10

    DevOps In The Public Cloud To Acclerate Delivery & Innovation

    In this talk, Benjamin will describe how using DevOps approaches on public cloud platforms can accelerate time to market for applications.  We will make reference to infrastructure automation, Docker containers, serverless technology and API platforms, and bring in multiple case studies from large digital programmes of which he has been a part of.
     

    Speaker

    Photo Speaker Name Profile
    Benjamin Wootton Benjamin Wootton View Profile
  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.
     
    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.
     
    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Policing Cyber Crime Add to Schedule Paul J Taylor  |   Greater Manchester Police  |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 11:40 to 12:10

    Policing Cyber Crime

    An overview of how Greater Manchester Police Cyber Crime Team investigate cyber dependant crime and support all other areas of policing as crime is increasingly facilitated by the internet and digital media.  Defining cyber crime, giving examples of all cyber enabled crime types, discussing recent cases and offering prevention advice.

    Speaker

    Photo Speaker Name Profile
    Paul J Taylor Paul J Taylor View Profile
  • Wed 26th Apr 12:00 - 12:50
  • Brought to you by AppCheck Add to Schedule

    Cyber Hack Theatre

    Wed 26th Apr 12:00 to 12:50

  • Wed 26th Apr 12:20 - 12:50
  • Brought to you by Zerto Add to Schedule
    Darren Swift  |   Zerto  |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 12:20 to 12:50

    Speaker

    Speaker Name Profile
    Darren Swift View Profile
  • Creating the agile business Add to Schedule
    Tech Leaders  |  Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 12:20 to 12:50

    Creating the agile business

    Keeping up with workforce trends and cultural shifts is an increasingly important part of running a successful business. But how do you create this agile environment and develop a solution that is both scalable and reliable? It’s time to move away from restrictive on-premise platforms and turn to the simplicity of the cloud and the agility this gives your business for all your communications needs. Come and find out how your organisation can benefit, how to can adopt a UCaaS strategy and understand how to implement it.

    Speakers

    Speaker Name Profile
    Paul Holden Paul Holden View Profile
    Ryan Osborne View Profile
  • Improving Security by Adding InSpec to Your Workflow Add to Schedule
    Mandi Walls  |   CHEF   |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 12:20 to 12:50

    Improving Security by Adding InSpec to Your Workflow

    InSpec is an open-source testing framework for infrastructure with a human-readable language for specifying compliance, security and other policy requirements.

    You can use InSpec to easily integrate automated tests that check for adherence to policy into any stage of your deployment pipeline. InSpec can help you manage your compliance needs on multiple platforms and for multiple applications. This talk will examine  the key aspects of InSpec for creating comprehensive checks for your systems, as well as the InSpec tools that allow you to incorporate security and compliance checks into your pipeline tools.

    Speaker

    Photo Speaker Name Profile
    Mandi Walls Mandi Walls View Profile
  • The dangers faced by the IoT and how to identify and mitigate risks on your network Add to Schedule Marc Laliberte  |   Watchguard Technologies   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 12:20 to 12:50

    The dangers faced by the IoT and how to identify and mitigate risks on your network

    In late 2016, the Mirai botnet highlighted a failure of the IoT industry in securing their products against relatively simplistic attacks. With IoT devices predicted to overtake mobile phones as the largest category of connected device by 2018, it’s now up to IT administrators and consumers to identify and mitigate the security risks on their networks posed by these devices. This seminar will discuss common risks posed by the explosive growth of IoT devices and how to mitigate them.

    Speaker

    Photo Speaker Name Profile
    Marc Laliberte Marc Laliberte View Profile
  • How to Detect and Protect against Insider Threats Add to Schedule John Hughes  |   Varonis   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 12:20 to 12:50

    How to Detect and Protect against Insider Threats

    For many organisations ransomware is a canary in the coalmine. It can be a leading indicator of much deeper security issues. Ransomware is noisy and exposes areas within an organisation that are vulnerable to even more sinister attacks that can't be remedied with a data restore.
     
    This session describes a methodology that will enable you to detect suspicious behaviour faster and get a handle on where your sensitive information lives and how to protect it from insider threats.

    Speaker

    Photo Speaker Name Profile
    John Hughes John Hughes View Profile
  • PANEL: The Future of AI Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 12:20 to 13:20

    PANEL: The Future of AI

    Artificial Intelligence is going to change the world – whether its dealing with your customer enquiries, streamlining your finance department or providing incredible insight in to your data the sky is the limit. Understanding the current capabilities and the future development roadmap is crucial to taking advantage for your enterprise. We have assembled a panel of world class experts who will grapple with the huge issue of what really is The Future of Artificial Intelligence?

    Speakers

    Photo Speaker Name Profile
    Amy Nicholson Amy Nicholson View Profile
    Paul Orchard Paul Orchard View Profile
  • Wed 26th Apr 13:00 - 13:30
  • Cloud 2.0: Take Back Control – Make the Cloud work for you Add to Schedule
    Kelly Murphy  |   HyperGrid   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 13:00 to 13:30

    Cloud 2.0: Take Back Control – Make the Cloud work for you

    Cloud 1.0 was a one way trip to powerful providers that locked in the enterprise. Cloud 2.0 turns multiple clouds into a set of resources that are controlled by the enterprise to extend their IT infrastructure enabling new workloads and digital innovation. Cloud 2.0 puts the enterprise in control of the cloud with superior economics, agility, visibility and governance over who uses what cloud resources - regardless of whether they are on-premise clouds, hosted private clouds or across any one of the 15+ public clouds.

    Speaker

    Photo Speaker Name Profile
    Kelly Murphy Kelly Murphy View Profile
  • Skype for Business Cloud PBX In the Real World Add to Schedule Tom Arbuthnot  |   Modality Systems  |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 13:00 to 13:30

    Skype for Business Cloud PBX In the Real World

    Skype for Business Cloud PBX has been available globally for over a year now, so we’ve had some real world customer deployments and hands-on experience. In this session, we will cover the Skype for Business deployment models, from 100% cloud to hybrid to 100% on premise. We will explain how features like PSTN Calling, PSTN Conferencing, Auto Attendants, Call Queues and Reporting work with hands-on demos and customer stories.
     
    The aim of the session is to answer all your Cloud PBX questions and show how it works in the real world.
     

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Using PaaS to get a head start with DevOps Add to Schedule
    Marcus Robinson  |   Microsoft  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 13:00 to 13:30

    Using PaaS to get a head start with DevOps

    Both implementing and managing DevOps practices such as CI/CD, auto scaling, blue/green deployments, A/B testing, performance testing and monitoring can take a lot of time and effort.  During this session we will investigate how Azure WebApps enables the creation of an enterprise grade web application with immediate access to multiple DevOps practices and zero interaction with underlying infrastructure.
     

    Speaker

    Photo Speaker Name Profile
    Marcus Robinson Marcus Robinson View Profile
  • Automating Security using Big Data and DNS Add to Schedule
    Rob Gregg  |   Cisco Umbrella   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 13:00 to 13:30

    Automating Security using Big Data and DNS

    Cisco Umbrella use big data and some advanced analytical techniques to identify malicious infrastructure across the internet to protect their customers. Join our engineer, Rob Gregg, as he brings you on a journey in to the data they see and how they crunch it to keep their users safe.

    Speaker

    Photo Speaker Name Profile
    Rob Gregg Rob Gregg View Profile
  • Innovative Endpoint Management: Build, Deploy and Patch Effectively Add to Schedule
    Sean Herbert  |   baramundi Software AG  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 13:00 to 13:30

    Innovative Endpoint Management: Build, Deploy and Patch Effectively

    With growing demands on IT Managers, controlling endpoint environments becomes increasingly complex. This seminar will show you, how you can drastically simplify system building, software deployment and vulnerability management whilst avoiding difficult repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Wed 26th Apr 13:30 - 14:20
  • Confessions of a Social Engineer…mapping the crazy wall Add to Schedule Jenny Radcliffe   |     |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Apr 13:30 to 14:20

    Confessions of a Social Engineer…mapping the crazy wall

    It is common knowledge that OSINT (open source intelligence) forms a huge part of social engineering attacks, but what exactly are social engineers looking for and how do they apply it when they have it.

    In this talk life-long social engineer and people-hacker Jenny Radcliffe gives a demonstration of how a “crazy wall” of information on a target is obtained, linked and mapped.
    During the talk the “crazy wall” of information will be constructed live, whilst Jenny explains how the links are created and the attack formed.  She shows how applying psychology, basic profiling and deductive reasoning helps paint the most personal of profiles on a target, and demonstrates how this knowledge can be used to craft the sharpest of “spear phishing” attacks.

    Speaker

    Photo Speaker Name Profile
    Jenny Radcliffe  Jenny Radcliffe View Profile
  • Wed 26th Apr 13:40 - 14:10
  • Architecting the Future: learnings from Google Add to Schedule Matt McNeill  |   Google  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 13:40 to 14:10

    Architecting the Future: learnings from Google

    Cloud is a rising trend, but one that is really in its infancy.  Google shares its view of the cloud as a platform-first mindset, opening the possibility of changing the fundamentals of computing to achieve new capabilities from compute architectures to data processing and machine learning. The next stage of machine intelligence offers both long and short term opportunities for those that can apply machine learning to analytics at web scale to relevant real world data that apply to your business.

    Speaker

    Photo Speaker Name Profile
    Matt McNeill Matt McNeill View Profile
  • Storage agility for Enterprise Cloud  Add to Schedule
    Pete Smith  |   Tintri   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 13:40 to 14:10

    Storage agility for Enterprise Cloud 

    The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture -- introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort. 

    Speaker

    Photo Speaker Name Profile
    Pete Smith Pete Smith View Profile
  • Shared Service Management: Move forward together Add to Schedule Sumit R. De   |   TOPdesk   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 13:40 to 14:10

    Shared Service Management: Move forward together

    In this seminar, Sumit De of TOPdesk will draw on real-world implementation experience to demonstrate how to best facilitate interdepartmental collaboration. The talk will discuss the concept of sharing services and how to get the most out of it. Based on cases from a variety of different organisations, the aim is to demonstrate how developing a shared service environment will lead to significant improvements both internally and externally. Join us and find out how small steps can lead to big improvements.

    Speaker

    Photo Speaker Name Profile
    Sumit R. De Sumit R. De View Profile
  • Spark Visualization with Highcharts Add to Schedule Rockie Yang  |   ThinkBig  |   IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Wed 26th Apr 13:40 to 14:10

    Spark Visualization with Highcharts

    Apache Spark is a fast and general engine for large-scale data processing. Programs can run up to 100x faster than MapReduce.
    Usually we need explore the dataset before we do real machine learning. It would be great if we could explore huge dataset and plot various diagrams with just with few lines of codes.
    We possibly need to see how the result is in a visual way when and after we did data analysing.
    We possibly like to share charts with others just send one single file. It would be great if ALL interactive features can be kept.

    Speaker

    Photo Speaker Name Profile
    Rockie Yang Rockie Yang View Profile
  • ELK for logging and enabling Cloud & DevOps transformation Add to Schedule
    Jon Hammant  |   EPAM Systems  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 13:40 to 14:10

    ELK for logging and enabling Cloud & DevOps transformation

    The combination of Elastic Search, Logstash and Kibana can be incredibly powerful to help facilitate migration to modern secure cloud and DevOps delivery.
    In this talk Jon will describe how the ELK stack can fit into a best of breed architecture to enable seamless logging over multiple systems to ensure improved stability, security and reporting. He’ll cover from an introduction through to best practice implementation and scaling.

    Speaker

    Photo Speaker Name Profile
    Jon Hammant Jon Hammant View Profile
  • GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data Add to Schedule Jason Hart  |   Gemalto   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 13:40 to 14:10

    GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data

    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.

    Speaker

    Photo Speaker Name Profile
    Jason Hart Jason Hart View Profile
  • The Enterprise Immune System: Unsupervised Machine Learning for Advanced Cyber Defence Add to Schedule Hayley Turner  |   Darktrace   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 13:40 to 14:10

    The Enterprise Immune System: Unsupervised Machine Learning for Advanced Cyber Defence

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defence is now being used to automatically detect and respond to threats - before they escalate.
     
    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, Enterprise Immune System technology is capable of detecting and remediating emerging threats on the network, without using rules or signatures. Installed at the heart of the network, Darktrace continually learns the ‘pattern of life’ of every network, device and user, identifying abnormal behaviours as they emerge. As an entirely self-learning system, Darktrace can furthermore use its understanding of ‘normal’ to automatically fight back against in-progress attacks, in a highly targeted manner.
     
    Rules and signatures are not keeping pace with today’s rapidly evolving cyber-attacks. Across 2,000 deployments worldwide, Darktrace is proven to spot threats that would otherwise go unnoticed within the noise of the network – from insider threat to ransomware, IoT hacks to long-term cyber espionage.

    Speaker

    Photo Speaker Name Profile
    Hayley Turner Hayley Turner View Profile
  • Wed 26th Apr 14:20 - 14:50
  • Brought to you by Nutanix Add to Schedule

    Keynote Theatre Theatre

    Wed 26th Apr 14:20 to 14:50

  • How to Recover from a Ransomware Infection; LIVE Add to Schedule
    James Mason  |   Datto   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 14:20 to 14:50

    How to Recover from a Ransomware Infection; LIVE

    Ransomware is having a field day. It’s still impossible to remove, but now phishing scams are getting smarter, anti-virus can’t detect it, and even if you pay up, you’re not guaranteed to get your data back. It attacks SMEs, schools and even the NHS. No one would willingly contract it - or would they? Watch as we infect a device with Ransomware - and recover it in under a minute. Datto’s high-availability approach to Backup and Disaster Recovery (BDR) will put ransomware cyber criminals out of business!

    Speaker

    Photo Speaker Name Profile
    James Mason James Mason View Profile
  • OnSite, Hosted or Cloud – What Unified Communications should you be buying? Add to Schedule David Macfarlane  |   Gamma   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 14:20 to 14:50

    OnSite, Hosted or Cloud – What Unified Communications should you be buying?

    The Cloud has revolutionised IT services with its asset-light model delivering on demand infrastructures and right-sized commercial models. So why, when it comes to voice and unified communications, are organisations still investing in on-site equipment, digital trunks and handsets? Voice is lagging behind in Cloud adoption, so come and learn from Gamma the benefits and potential challenges that come with migrating to a Cloud voice solution, so you make a good decision, ensure your business needs are met and it delivers you the best value.

    Speaker

    Photo Speaker Name Profile
    David Macfarlane David Macfarlane View Profile
  • "What the Data???" Add to Schedule Amy Nicholson  |   Microsoft  |   IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Wed 26th Apr 14:20 to 14:50

    "What the Data???"

    The world and technology are once again transforming, the vast majority of the worlds data is now digital and customers who are harnessing the power of big data, the cloud and intelligent applications are doing revolutionary things.

    In this session, Amy will introduce you to some of the game changing technologies people are using *today* to make their applications stand out from the rest, using advanced analytics and machine learning services, IoT technologies and data visualisation. By diving into the services that build up advanced analytics architectures in the cloud, creating machine learning models and harnessing the intelligence via APIs.

    Speaker

    Photo Speaker Name Profile
    Amy Nicholson Amy Nicholson View Profile
  • How and why to design your teams for modern software systems Add to Schedule
    Matthew Skelton  |   Skelton Thatcher Consulting Ltd  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 14:20 to 14:50

    How and why to design your teams for modern software systems

    For effective, modern, cloud-connected software systems we need to organize our teams in certain ways. Taking account of Conway’s Law, we look to match the team structures to the required software architecture, enabling or restricting communication and collaboration for the best outcomes. This talk will cover the basics of organization design, exploring a selection of key team topologies and how and when to use them in order to make the development and operation of your software systems as effective as possible. The talk is based on experience helping companies around the world with the design of their teams.
     
    In summary, this talk will cover the basics of organization design, exploring a selection of key team topologies and how and when to use them in order to make the development and operation of your software systems as effective as possible.

    Speaker

    Photo Speaker Name Profile
    Matthew Skelton Matthew Skelton View Profile
  • Brought to you by Xirrus Add to Schedule

    Cyber Threat Protection Theatre

    Wed 26th Apr 14:20 to 14:50

  • NO SECURITY WITHOUT TRUST: The critical role of trusted identities in digital transformation. Add to Schedule
    Ian Wills  |   Entrust Datacard   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 14:20 to 14:50

    NO SECURITY WITHOUT TRUST: The critical role of trusted identities in digital transformation.

    The digital revolution has enhanced consumers’ desire for streamlined and secure access and the necessity for a secure trusted identity has never been more important. Ian will discuss the importance and implications of a secure, trusted identity-based authentication solution ecosystem and address the advances being made around adaptive authentication solutions.

    Speaker

    Photo Speaker Name Profile
    Ian Wills Ian Wills View Profile
  • Wed 26th Apr 14:30 - 15:20
  • GDPR Countdown is on! Are you Ready? Add to Schedule
    Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Apr 14:30 to 15:20

    GDPR Countdown is on! Are you Ready?

    Root and branch data protection reform is coming under the General Data Protection Regulation (GDPR) in May 2018.  We’ll guide you through what this reform means for your business, looking at compliance obligations and how good data governance can help save and make you money.  Even though this is European legislation, the Government has confirmed that it will still become law despite Brexit!  Topics for discussion include:

    - Compulsory notification of data breaches
    - Refreshing consents
    - Reviewing privacy policies to ensure they are sufficiently transparent
    - The Right to be Forgotten
    - Increased subject access rights
    - Fines

    We’ll draw on our 20 years data protection experience, looking at key actions businesses need to take and how to navigate the pathway to compliance.

    http://www.irwinmitchell.com/gdpr-2018

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Wed 26th Apr 15:00 - 15:30
  • How to tell if you are being cyber stalked or hacked Add to Schedule Paul Vlissidis  |   NCC Group  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 15:00 to 15:30

    How to tell if you are being cyber stalked or hacked

    As the cyber lead on Channel 4’s Hunted, Paul and his team hacked over 100 people across two series.
     
    Although the majority of people may think they have some understanding of what good security practices are, attacks are becoming more sophisticated and the prevalence of hackers targeting individuals has increased exponentially in recent years. This session will provide insight into the techniques hackers use, offer tips on how to spot when an attack is in progress, and inform attendees of the online behaviours and techniques that can minimise the threat of such attacks.

    Speaker

    Photo Speaker Name Profile
    Paul Vlissidis Paul Vlissidis View Profile
  • Brought to you by Nutanix Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 15:00 to 15:30

  • The 5 questions you should be asking your network team Add to Schedule
    Jon Nowell  |   TalkTalk Business   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 15:00 to 15:30

    The 5 questions you should be asking your network team

    Does your Network strategy keep you awake at night? If not perhaps it should… The worlds of business and technology are changing at a rapid rate, with new solutions and ways of working disrupting established ways of doing things. To make the most of them, you need a clear strategy for implementing the latest developments into your business, as well as a strong infrastructure to be able to cope with the demands they will place on your network.

    With mobility and cloud computing driving digital transformation and our appetite for bandwidth showing no sign of diminishing, is your connectivity future-ready to help your business scale? Join us to find out what should be keeping your network manager awake at night and how to make sure your business is one step ahead of the robots!

    Speaker

    Photo Speaker Name Profile
    Jon Nowell Jon Nowell View Profile
  • Brought to you by ThoughtWorks Add to Schedule Tom Glover  |   ThoughtWorks  |   IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Wed 26th Apr 15:00 to 15:30

    Speaker

    Speaker Name Profile
    Tom Glover View Profile
  • Devops By The Numbers Add to Schedule Rob Vanstone  |   XebiaLabs  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Wed 26th Apr 15:00 to 15:30

    Devops By The Numbers

    There’s no mistaking how important initiatives like DevOps and Continuous Delivery have become to organisations seeking to gain a competitive edge. However, without the right metrics, enterprises that have adopted DevOps or Continuous Delivery strategies have no way of measuring their effectiveness in the context of their digital transformation goals. So, what are the right measures that can answer questions like “are we getting better at delivering high-quality software faster and at scale?” and “has all this effort been worth it?!”

    Speaker

    Photo Speaker Name Profile
    Rob Vanstone Rob Vanstone View Profile
  • Brought to you by Zonefox Add to Schedule
    Jamie Graves  |   ZoneFox   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 26th Apr 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Jamie Graves Jamie Graves View Profile
  • Wed 26th Apr 15:40 - 16:10
  • Where Docker fits in Windows Enterprises Add to Schedule Elton Stoneman  |   Docker  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 26th Apr 15:40 to 16:10

    Where Docker fits in Windows Enterprises

    Docker is revolutionizing how companies build and manage software. It's a platform which supports a simple workflow for building, shipping and running applications. Apps are packaged as a single unit in Docker - with all their dependencies and configuration settings in one place. That package can be shared on a public registry, or on a private registry in your enterprise. Anyone with access can download the package and run the application with a single command. And the application will behave the same way wherever you run it - on a laptop, or a server in the data centre, or a VM in the cloud - because the package contains everything it needs. In this session I'll cover where Docker fits in Windows enterprises, showing how Windows apps run in Docker, and what that means for development, operations and the business.

    Speaker

    Photo Speaker Name Profile
    Elton Stoneman Elton Stoneman View Profile
  • Brought to you by Skybet Add to Schedule

    IoT, Analytics & AI Theatre

    Wed 26th Apr 15:40 to 16:10

  • How to become cyber resilient in an ever-changing threat landscape Add to Schedule
    Oliver Eckel  |   Cognosec   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 26th Apr 15:40 to 16:10

    How to become cyber resilient in an ever-changing threat landscape

    The critical objective of organizations today is to withstand significant cyber attacks and continue core operations. So, despite an attack, the organization carries on – patients are treated, power is generated, business flows.

    Our approach is based on the NIST framework where we:

    IDENTIFY
    Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities.

    PROTECT
    Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.

    DETECT
    Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

    RESPOND
    Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.

    RECOVER
    Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.

    Speaker

    Photo Speaker Name Profile
    Oliver Eckel Oliver Eckel View Profile
  • Business Risk and Resilience in 2017 Add to Schedule
    Chris Butler  |   Sungard Availability Services   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Wed 26th Apr 15:40 to 16:10

    Business Risk and Resilience in 2017

    During this session we will look at the how best to manage risk within your business and make your business more resilient in 2017.

    The session will include key information and talking points around the challenges facing businesses 2017.

    Speaker

    Speaker Name Profile
    Chris Butler View Profile
  • PANEL: Brought to you by Pro Manchester Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 26th Apr 15:40 to 16:30

  • Wed 26th Apr 16:20 - 16:50
  • Oracle Keynote Add to Schedule

    Keynote Theatre Theatre

    Wed 26th Apr 16:20 to 16:50

  • Thu 27th Apr 10:00 - 10:40
  • Cognitive Automation - Design for No Touch Add to Schedule
    Mike Hobday  |     |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Mike Hobday Mike Hobday View Profile
  • Thu 27th Apr 11:00 - 11:30
  • Amazon Web Services Keynote: Innovating in the Cloud Add to Schedule Ian Massingham  |   Amazon Web Services  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 11:00 to 11:30

    Amazon Web Services Keynote: Innovating in the Cloud

    During 2016, AWS announced over 1000 new features and services, including a suite of services that are intended to make it simpler and easier for developers to incorporate Artificial Intelligence based on Deep Learning into their applications. Join Amazon Web Services Chief Technical Evangelist, Ian Massingham, and learn how startups, enterprises and public sector organisations in the UK are using the AWS Cloud; unlocking their ability to innovate rapidly on behalf of their customers. Learn how you too can apply the latest new services from AWS to help you build new applications and modernise your existing IT; driving down costs, improving agility and raising the bar for information security and compliance in the process.

    Speaker

    Photo Speaker Name Profile
    Ian Massingham Ian Massingham View Profile
  • How Storage can be an enabler for your Multicloud Strategy Add to Schedule
    Richard Fenton  |   Nimble Storage   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 11:00 to 11:30

    How Storage can be an enabler for your Multicloud Strategy

    Enterprises and their lines of business are embracing cloud for flexible infrastructure and business agility. The first wave of cloud native and content apps is well underway, but there is a second wave of traditional enterprise applications that are starting their move to the cloud. These applications place far higher demands on storage and expect enterprise reliability and data services that are not readily available in the cloud. Plus, there is lock-in, lack of data mobility, and lack of visibility across clouds and your data center. These are all challenges slowing down enterprise cloud adoption.

    Speaker

    Photo Speaker Name Profile
    Richard Fenton Richard Fenton View Profile
  • Protect Your Data from New Exfiltration Techniques Add to Schedule Martin Wellsted  |   EfficientIP   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Thu 27th Apr 11:00 to 11:30

    Protect Your Data from New Exfiltration Techniques

    DNS servers are not only a favorite target for hackers, they are now also exploited as the vector of attacks. Using the DNS protocol itself, intruders can easily exfiltrate data from your network, while your actual security solution remains blind. As the average time to discover a data breach is 146 days - and GDPR regulations will require notification in 72 hours - has it already happened to your organisation? Learn how exfiltration works and ways to mitigate it, to protect your business and data.

    Speaker

    Photo Speaker Name Profile
    Martin Wellsted Martin Wellsted View Profile
  • The Internet of Things and Machine Learning Add to Schedule Michael Karliner   |   RedSift  |   IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Thu 27th Apr 11:00 to 11:30

    The Internet of Things and Machine Learning

    Much has been made of the flood of data to be generated by the Internet of Things. However, it is rarely explained how all this data will be transferred across low bandwidth wireless networks and then adequately processed to give real business insight. Clearly, it is not Big Data that is required, so much as Smart Data.

    This seminar details some of the technologies involved and describes work in progress on the intersection of Machine Learning and other techniques with IoT.

    Speaker

    Photo Speaker Name Profile
    Michael Karliner Michael Karliner View Profile
  • Why DevOps Transformation has to start with you Add to Schedule Steve Thair  |   ‎DevOpsGuys  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Thu 27th Apr 11:00 to 11:30

    Why DevOps Transformation has to start with you

    At DevOpsDays in Rome 2012 Damon Edwards coined the phrase “You Can't Change Culture, But You Can Change Behaviour”.
     
    Dealing with the cultural and organisational challenges that are at the heart of a DevOps Transformation (that is probably a part of a wider Digital Transformation) are hard problems. They require us to be open to new ways of working and new ways of collaboration across silos.
     
    In this session the CTO of DevOpsGuys will talk about the challenges we see in the organisations we work with and explain why DevOps transformation needs to start with YOU, even if your organisation hasn’t yet embraced a DevOps agenda.

    Speaker

    Photo Speaker Name Profile
    Steve Thair Steve Thair View Profile
  • Addressing Shadow IT And The Cloud App Visibility Blind Spot Add to Schedule
    Carl Leonard  |   Forcepoint   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 27th Apr 11:00 to 11:30

    Addressing Shadow IT And The Cloud App Visibility Blind Spot

    In this presentation, Carl Leonard, Principal Security Analyst at Forcepoint, addresses the challenges that stem from cloud app adoption and proposes best practices to regain visibility, control and a reduction in security risk.

    While cloud apps and BYOD policies are known to increase user productivity and lower operating costs, they are also responsible for introducing risk that traditional security controls were not designed to handle.

    A different approach is required if organisations are going enable the safe and productive use of cloud apps and services.

    Speaker

    Photo Speaker Name Profile
    Carl Leonard Carl Leonard View Profile
  • Security and Visibility: Two Sides of the Same Coin Add to Schedule
    Malcolm Murphy  |   Infoblox   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 27th Apr 11:00 to 11:30

    Security and Visibility: Two Sides of the Same Coin

    You can’t secure what you can’t see and not knowing what’s on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today’s complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration.

    Speaker

    Photo Speaker Name Profile
    Malcolm Murphy Malcolm Murphy View Profile
  • Thu 27th Apr 11:40 - 12:10
  • The IoT, from cradle to grave Add to Schedule Ken Munro  |   Pen Test Partners LLP  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 11:40 to 12:10

    The IoT, from cradle to grave

    While there are many clear benefits from the IoT such as new manufacturing opportunities, seamless data sharing, growth in cloud services, and direct “intelligent” retail, what are the risks and where is it taking us?

    This talk will look at the challenge of securing and encrypting IoT devices, the potential for more and bigger IoT enabled DDoS attacks, and how manufacturers and vendors can deal with IoT devices as they reach their effective end-of-life.

    Speaker

    Photo Speaker Name Profile
    Ken Munro Ken Munro View Profile
  • The Top Unsung Heroes of Veeam Availability Suite 9.5 Add to Schedule
    Artem Philippov  |   Veeam   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 11:40 to 12:10

    The Top Unsung Heroes of Veeam Availability Suite 9.5

    For some time now we’ve been telling you about the innovative enhancements in Veeam® Availability Suite™ v9.5. Features such as Nimble Storage integration, full integration with Windows server 2016 Data Centre Technologies and Direct Restore to Microsoft Azure are already well known among our users.

    As a result of ongoing research and development efforts, and in response to customer feedback, Veeam Backup & Replication 9.5 also includes an extensive range of additional features and enhancements – including features that haven’t even been promoted!

    Speaker

    Speaker Name Profile
    Artem Philippov View Profile
  • Cloud Solutions supporting the transformation for the charity sector Add to Schedule
    Neil Henderson  |   Safeline  |   Cloud & Mobility

    Cloud & Mobility Theatre

    Thu 27th Apr 11:40 to 12:10

  • Brought to you by Qlik Add to Schedule

    IoT, Analytics & AI Theatre

    Thu 27th Apr 11:40 to 12:10

  • Brought to you by Hewlett Packard Enterprise Add to Schedule

    DevOps & Open Source Theatre

    Thu 27th Apr 11:40 to 12:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 27th Apr 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.
     
    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.
     
    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Securing the Future Add to Schedule
    Oliver Eckel  |   Cognosec   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 27th Apr 11:40 to 12:10

    Securing the Future

    With technological development moving faster every day our ability to develop new ideas outpaces the rate we can regulate them. Our lives have changed enormously over the last 30 years , but so has the distance between technology legislation and regulation.

    Speaker

    Photo Speaker Name Profile
    Oliver Eckel Oliver Eckel View Profile
  • Thu 27th Apr 12:00 - 12:50
  • To pay or not to pay, that is the question: How to tackle Ransomware Add to Schedule Gary Watson  |   Nexsan  |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Apr 12:00 to 12:50

    To pay or not to pay, that is the question: How to tackle Ransomware

    Recently news hit the media that UK companies are stockpiling bitcoins in preparation for a Ransomware attack. This means two things, one that they expect an attack and two, that they see no choice but to pay it. It seems investing in Bitcoins is the only solution some businesses have, but this sends out totally the wrong message that “we’re vulnerable and prepared to pay”.

    This might not seem surprising since malware strains are constantly evolving and security deigned to keep out the virus struggle to keep up with the increasing sophistication of the attacks. However, there is a way to combine data security with data protection, which can keep data safe and eliminate the need to pay the ransom. In his talk To pay or not to pay, that is the question: How to tackle Ransomware, Gary Watson, VP of Technical Engagement for Nexsan, will show you how you can keep your data and your reputation safe without paying any ransoms.
     

    Speaker

    Photo Speaker Name Profile
    Gary Watson Gary Watson View Profile
  • Thu 27th Apr 12:20 - 12:50
  • Will DCIM-driven cloud services change the game for data centre management? Add to Schedule
    Stefano D'Agostino  |   Schneider Electric   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 12:20 to 12:50

    Will DCIM-driven cloud services change the game for data centre management?

    IoT, big data and cloud services all have the potential to dramatically change how data centers are managed. Find out how live data collection, machine learning, and big data analytics can provide real-time operational visibility, alarming, remote troubleshooting and predictive analytics for an efficient data centre.

    Speaker

    Speaker Name Profile
    Stefano D'Agostino View Profile
  • Not all SD-WANS are created equal - Why performance matters Add to Schedule
    Simon Pamplin  |   Silver Peak   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Thu 27th Apr 12:20 to 12:50

    Not all SD-WANS are created equal - Why performance matters

    The data centre is increasingly becoming ruled by software. Software defined storage, software defined networks, virtual machines, and network function virtualization are all changing the way technology is deployed. In this session we will review the software defined landscape, paying close attention to the Software Defined WAN and how it can lower costs, reduce deployment times, and create a more flexible infrastructure. Importantly we will discuss technologies and capabilities covering Performance, Network Visibility, Service chaining and Security that define how you Build a Better WAN.

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Production ML Add to Schedule Jan Machacek  |   Cake Solutions  |   IoT, Analytics & AI

    IoT, Analytics & AI Theatre

    Thu 27th Apr 12:20 to 12:50

    Production ML

    Jan will talk about his experience building several production-grade systems that heavily rely on machine learning & computer vision. He will talk about the challenges in not only the machine learning (and deep learning) code, but also about test and validation data management, the development & experimentation environments; then on the “production” side, model storage & serving, validation data reporting, and obviously continuous integration & deployment.

    Speaker

    Photo Speaker Name Profile
    Jan Machacek Jan Machacek View Profile
  • Firewall-as-a-Service: Enterprise Grade Security for Everyone Add to Schedule
    Mark Bayne  |   Cato Networks   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 27th Apr 12:20 to 12:50

    Firewall-as-a-Service: Enterprise Grade Security for Everyone

    Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the tough tradeoff between hardware capacity and strong security. Organizations end up compromising on strength of protection or the end user experience.

    Even when running smoothly, firewalls and UTMs are location bound and can't effectively protect the mobile users and cloud infrastructure that are now an integral part of the business.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • Still struggling on with yesterday’s tools? Threat hunting the Firemon way Add to Schedule
    Dawid Kowalski  |   FireMon   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 27th Apr 12:20 to 12:50

    Still struggling on with yesterday’s tools? Threat hunting the Firemon way

    Still Struggling with Yesterday’s Tools? Threat Hunting the FireMon Way

    Threat hunting as a discipline is still very primitive for many organisations. Most hunting teams assemble data manually from a host of sources in hopes to find attackers and stop a breach. How does one target, detect and disrupt sophisticated attackers when their alerting systems can’t keep up?

    It begins by recognising that data aggregation is only the start. Though investment has increased, traditional even management tools continue to fail, while producing more alerts than can be counted…forget about analysed.

    Join us for this talk where we will share how FireMon is helping organisation enter a new era of threat hunting.

    Speaker

    Photo Speaker Name Profile
    Dawid Kowalski Dawid Kowalski View Profile
  • Deep Dive: Serverless Computing with AWS Lambda Add to Schedule Ian Massingham  |   Amazon Web Services  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Thu 27th Apr 12:20 to 12:50

    Deep Dive: Serverless Computing with AWS Lambda

    AWS Lambda is a compute service that lets you run code without provisioning or managing servers. AWS Lambda executes your code only when needed and scales automatically, from a few requests per day to thousands per second. In this deep dive session, Ian Massingham will introduce AWS Lambda, describe examples the use-cases that customers are using AWS Lambda to service and demonstrate how AWS Lambda functions to can integrated with event sources, such as the AWS IoT, or Amazon S3, as powerful tool for building scalable and sophisticated applications, all without a single operating system or server to manage!

    Speaker

    Photo Speaker Name Profile
    Ian Massingham Ian Massingham View Profile
  • Panel: The Future of IOT Add to Schedule
    Tech Leaders  |  Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 12:20 to 13:30

    Panel: The Future of IOT

    We’ve heard about IOT for a long time but how exactly can enterprise drive value from it? What can we learn from the early adopters and how do AI and analytics technologies effect the landscape? Making sense of this all against a terrifying backdrop of cyber security vulnerabilities is a difficult issue for enterprise technology leaders but the opportunity is too important to miss. This is a rare opportunity to hear from a stellar panel of world class experts who will layout the opportunities and threats for your enterprise to take full advantage of the Internet of Things.

    Speakers

    Photo Speaker Name Profile
    Ken Munro Ken Munro View Profile
    Michael Hobbs Michael Hobbs View Profile
    Michael Karliner Michael Karliner View Profile
    Tomasz Mloduchowski Tomasz Mloduchowski View Profile
  • Thu 27th Apr 13:00 - 13:30
  • How to Recover from a Ransomware Infection; LIVE Add to Schedule
    James Mason  |   Datto   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 13:00 to 13:30

    How to Recover from a Ransomware Infection; LIVE

    Ransomware is having a field day. It’s still impossible to remove, but now phishing scams are getting smarter, anti-virus can’t detect it, and even if you pay up, you’re not guaranteed to get your data back. It attacks SMEs, schools and even the NHS. No one would willingly contract it - or would they? Watch as we infect a device with Ransomware - and recover it in under a minute. Datto’s high-availability approach to Backup and Disaster Recovery (BDR) will put ransomware cyber criminals out of business!

    Speaker

    Photo Speaker Name Profile
    James Mason James Mason View Profile
  • Open Source = DevOps! Add to Schedule
    Phil Prosser  |   Red Hat   |   DevOps & Open Source

    DevOps & Open Source Theatre

    Thu 27th Apr 13:00 to 13:30

    Open Source = DevOps!

    DevOps, Bi-Modal, 3rd Platform, Mobile First, Cloud Native! With the current pressure on IT to provide faster and more agile platforms for business Red Hat will show why those adopting OpenSource tooling and practice are succeeding at the expense of those who don’t.

    Speaker

    Photo Speaker Name Profile
    Phil Prosser Phil Prosser View Profile
  • Innovative Endpoint Management: Build, Deploy and Patch Effectively Add to Schedule
    Sean Herbert  |   baramundi Software AG  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 27th Apr 13:00 to 13:30

    Innovative Endpoint Management: Build, Deploy and Patch Effectively

    With growing demands on IT Managers, controlling endpoint environments becomes increasingly complex. This seminar will show you, how you can drastically simplify system building, software deployment and vulnerability management whilst avoiding difficult repackaging procedures.

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Automating Security using Big Data and DNS Add to Schedule
    Rob Gregg  |   Cisco Umbrella   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 27th Apr 13:00 to 13:30

    Automating Security using Big Data and DNS

    Cisco Umbrella use big data and some advanced analytical techniques to identify malicious infrastructure across the internet to protect their customers. Join our engineer, Rob Gregg, as he brings you on a journey in to the data they see and how they crunch it to keep their users safe.

    Speaker

    Photo Speaker Name Profile
    Rob Gregg Rob Gregg View Profile
  • Business Risk and Resilience in 2017 Add to Schedule
    Chris Butler  |   Sungard Availability Services   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Thu 27th Apr 13:00 to 13:30

    Business Risk and Resilience in 2017

    During this session we will look at the how best to manage risk within your business and make your business more resilient in 2017.

    The session will include key information and talking points around the challenges facing businesses 2017.

    Speaker

    Speaker Name Profile
    Chris Butler View Profile
  • Thu 27th Apr 13:30 - 14:20
  • Brought to you by Pen Test Partners Add to Schedule
    Ken Munro  |   Pen Test Partners LLP  |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Apr 13:30 to 14:20

    Speaker

    Photo Speaker Name Profile
    Ken Munro Ken Munro View Profile
  • Thu 27th Apr 13:40 - 14:10
  • Blockchain, AI, IOT and NFC technologies – Bringing it all together [Live Demo] Add to Schedule
    Tomasz Mloduchowski  |   Zerado  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 13:40 to 14:10

    Blockchain, AI, IOT and NFC technologies – Bringing it all together [Live Demo]

    This is an exciting opportunity to see a real world demonstration of an actual working integration of Artificial Intelligence, Blockchain, Internet of Things and Near Field Communication technologies. In this demonstration you’ll be able to see under the hood of ingenious solution to the issues around access control. Office space, residential property and real estate management has remained largely unevolved since the 1970s. Onboarding, security checks and payment were all cumbersome processes. This has completely reversed over the last 40 years - now, we can onboard, assure identity or pay in a split-second using contactless technologies. Yet, almost all office spaces operate under the old paradigm, which means higher costs, increased error and rising fraud. By integrating Artificial Intelligence, Blockchain, Internet of Things and Near Field Communication technologies, smart access control enables co-working spaces, hotels, and other real estate operators to reduce facility administration costs and provide a frictionless and secure user registration and access solution.

    Speaker

    Photo Speaker Name Profile
    Tomasz Mloduchowski Tomasz Mloduchowski View Profile
  • Data Center Transformation – An Introduction to Hyperconverged Infrastructure Add to Schedule
    Bruce Milne  |   Pivot3   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 13:40 to 14:10

    Data Center Transformation – An Introduction to Hyperconverged Infrastructure

    With traditional data center infrastructure becoming more expensive and difficult to manage, IT organizations are looking for solutions that enable increased simplicity, agility, and improved economics. Today, organizations need to deploy applications faster to meet ever increasing end-user expectations for always-on data availability and instant access to information. In this session, experts from Pivot3 will explore some of the core HCI concepts, and discuss how Pivot3’s pioneering Hyperconverged architecture can enable you to drive transformational business benefits as you move towards the next generation of datacenters.

    Speaker

    Photo Speaker Name Profile
    Bruce Milne Bruce Milne View Profile
  • How to drive down the cost of calls, without getting fired! Add to Schedule
    Guy Miller  |   TalkTalk Business   |   Cloud & Mobility

    Cloud & Mobility Theatre

    Thu 27th Apr 13:40 to 14:10

    How to drive down the cost of calls, without getting fired!

    If you’ve been to IP EXPO for the last ten years, you’d be forgiven in thinking that every man and his dog has moved their calls from ISDN to SIP Trunks or IP Voice already. You probably think you’re the only business left that hasn’t jumped into the new world. Fortunately, we’re here to tell you that you aren’t the last. Much like the 75% of people worldwide who DON’T have a Facebook profile, there are plenty of reasons why not everyone has taken the opportunity to save money yet. Some are nervous, some have had bad experiences and many have got legacy systems and even local wiring issues that doesn’t make it easy to move.

    In this session, you’ll learn that there are low-cost, low-risk solutions available to take you on the journey, without an expensive and risky change to your current systems and networks. Use this opportunity to truly drive down monthly costs, without the risk of being fired for a bad decision!

    Speaker

    Photo Speaker Name Profile
    Guy Miller Guy Miller View Profile
  • Delivering Secure DevOps at Scale Add to Schedule Kalbir Sohi   |   drie  |   DevOps & Open Source

    DevOps & Open Source Theatre

    Thu 27th Apr 13:40 to 14:10

    Delivering Secure DevOps at Scale

    In organisations you often find that security people are seen as the blockers, the department of "no". Security is about locking down and stopping things. But there is another way. The tools and culture of DevOps give us a blue print for how security can become an enabler of innovative projects.
     
    Kalbir Sohi, CEO of drie, was responsible for building and managing HM Revenue & Customs’s internal platform as a service. He’ll talk about how he used automation, cloud, empathy and checklists to help move HMRC from delivering two-year waterfall projects to six-week agile processes.

    Speaker

    Photo Speaker Name Profile
    Kalbir Sohi Kalbir Sohi View Profile
  • Thu 27th Apr 14:20 - 14:50
  • GDPR - is it another Y2k moment OR a huge business risk? Add to Schedule
    Gareth Neal  |   PwC  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 14:20 to 14:50

    GDPR - is it another Y2k moment OR a huge business risk?

    After four long years of political negotiations and lobbying, the EU agreed the final wording of the General Data Protection Regulation (“GDPR”) in December 2015. This will impact every entity that holds or uses European personal data both inside and outside of Europe. Gareth Neal will outline what the GDPR is all about in terms of the practical interpretation of this new Regulation. He will draw upon his vast experience working for the UK Regulator - the ICO and his experience of helping clients establish their GDPR compliance programmes.

    Speaker

    Photo Speaker Name Profile
    Gareth Neal Gareth Neal View Profile
  • Brought to you by Nutanix Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 27th Apr 14:20 to 14:50

  • Brought to you by Xirrus Add to Schedule

    Cloud & Mobility Theatre

    Thu 27th Apr 14:20 to 14:50

  • Thu 27th Apr 15:00 - 15:30
  • vSAN, the most feature complete hyper-converged infrastructure solution Add to Schedule
    Cormac Hogan  |   VMware  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 27th Apr 15:00 to 15:30

    vSAN, the most feature complete hyper-converged infrastructure solution

    Learn about VMware vSAN, the leading hyper-converged infrastructure (HCI) Since its release three years ago, vSAN has gone from strength to strength, adding multiple storage features and gaining more than 7,000 active customers. In this session, Cormac Hogan of VMware will outline the vSAN architecture, highlight many of the key data services, and describe the some of the very many vSAN use-cases. This session will showcase why many VMware customers are switching to vSAN to meet their storage requirements and the results they are achieving.

    Speaker

    Photo Speaker Name Profile
    Cormac Hogan Cormac Hogan View Profile
  • Brought to you by Viptela Add to Schedule

    Cloud & Mobility Theatre

    Thu 27th Apr 15:00 to 15:30

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top