Menu

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 25th Apr 10:00 - 10:40
  • Opening Keynote by Robert Hannigan Add to Schedule Robert Hannigan  |     |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Robert Hannigan Robert Hannigan View Profile
  • Wed 25th Apr 11:00 - 11:30
  • Brought to you by Amazon Web Services Add to Schedule Ian Massingham  |   Amazon Web Services  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Ian Massingham Ian Massingham View Profile
  • Brought to you by Esteem Add to Schedule

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 11:00 to 11:30

  • Brought to you by Tintri Add to Schedule Ross McSorley  |   Tintri   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Ross McSorley Ross McSorley View Profile
  • Brought to you by Digital Engagement (Department for Work & Pensions) Add to Schedule Rob Thompson  |   Digital Engagement - Department for Work & Pensions  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Wed 25th Apr 11:00 to 11:30

  • Brought to you by ASI Data Science Add to Schedule Angie Ma  |   ASI Data Science  |   IOT, analytics & AI

    IOT, analytics & AI Theatre

    Wed 25th Apr 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Angie Ma Angie Ma View Profile
  • Brought to you by Interoute Add to Schedule

    Cloud Architecture Theatre

    Wed 25th Apr 11:00 to 11:30

  • The Quickest Way to Get Hacked in the Cloud Add to Schedule Oliver Pinson-Roxburgh  |   Alert Logic   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 25th Apr 11:00 to 11:30

    The Quickest Way to Get Hacked in the Cloud

    Insights from the 2017 Cloud Security Report

    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one, so how do you design a full scale? 

    Public cloud providers have recently added services that root out security threats higher up the stack, but is your business prepared to systematically act on the alerts these services provide? How can you cover the full breadth of things?

    Join Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture, as he shares insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world. 

    Impactful session to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security, manage risk and be compliant.

    Speaker

    Photo Speaker Name Profile
    Oliver Pinson-Roxburgh Oliver Pinson-Roxburgh View Profile
  • Brought to you by Varonis Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 25th Apr 11:00 to 11:30

  • Cyber Resilience, TARA and Red Teaming Add to Schedule Peter Wood   |   First Base Technologies LLP  |   Cyber Hack

    Cyber Hack Theatre

    Wed 25th Apr 11:00 to 12:00

    Cyber Resilience, TARA and Red Teaming

    Cyber risk isn't new, but the stakes grow higher every day. An incident is no longer likely to be an isolated event, but a sustained and persistent campaign. There is no single solution that will offer protection from an attack, but a Cyber Resilience strategy can provide a multi-layered approach that encompasses people, processes and technology. Pete will talk about eliminating the gap between IT and the business to present a united front against threats. This is a paradigm shift that uses security intelligence to guide decisions and support agility.

    Speaker

    Photo Speaker Name Profile
    Peter Wood Peter Wood View Profile
  • Wed 25th Apr 11:40 - 12:10
  • IT WASN'T ME, IT WAS BENNETT ARRON Add to Schedule Bennett Arron   |     |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 11:40 to 12:10

    IT WASN'T ME, IT WAS BENNETT ARRON

    Several years ago Bennett Arron was in serious debt. He owed thousands of pounds to phone companies, banks and department stores. Only it wasn’t him. Bennett was a victim of Identity Theft - and one of the first major victims of the crime in the UK. This theft resulted in Bennett becoming penniless and homeless.

    Years later, Bennett wrote, directed and presented the Television Documentary How To Steal An Identity in which he stole the identity of the Home Secretary. The Documentary was described as ‘Fascinating and Disturbing’ and was ‘Pick of The Week’ in all the major press. Bennett was subsequently shortlisted for a BAFTA – and taken in for ‘questioning’ by Scotland Yard!

    Speaker

    Photo Speaker Name Profile
    Bennett Arron Bennett Arron View Profile
  • Brought to you by Cohesity Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 11:40 to 12:10

  • Brought to you by Pure Storage Add to Schedule

    IOT, analytics & AI Theatre

    Wed 25th Apr 11:40 to 12:10

  • Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Security Add to Schedule Greg Iddon  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 25th Apr 11:40 to 12:10

    Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Security

    Sophos' Greg Iddon peels back the layers of jargon surrounding the machine learning field and explains how the security industry is supplementing reactive, human-based malware research with predictive machine learning models to defend against the relentless onslaught of malware.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • HACKING EXPOSED: STORIES FROM THE BATTLEFIELD: LESSONS LEARNT IN RESPONDING TO THE MOST ADVANCED CYBER ATTACKS Add to Schedule Zeki Turedi  |   Crowdstrike   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 25th Apr 11:40 to 12:10

    HACKING EXPOSED: STORIES FROM THE BATTLEFIELD: LESSONS LEARNT IN RESPONDING TO THE MOST ADVANCED CYBER ATTACKS

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Zeki Turedi Zeki Turedi View Profile
  • Wed 25th Apr 12:20 - 12:50
  • Patching - A Death Star Analysis Add to Schedule

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 12:20 to 12:50

    Patching - A Death Star Analysis

    Whether it was Meltdown, Spectre, Wannacry, or the countless other malware and ransomware attacks over the past few years, the same conclusions are generally made... If you have a vulnerability, remediate it! Sean Herbert, Country Manager UK for baramundi software explores some examples and best practices for your patching processes with some real (and other worldly) examples of where it went wrong.

  • Brought to you by arcserve Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 12:20 to 12:50

  • Brought to you by Splunk Add to Schedule

    DevOps & Serverless Theatre

    Wed 25th Apr 12:20 to 12:50

  • Brought to you by Zuhlke Add to Schedule

    IOT, analytics & AI Theatre

    Wed 25th Apr 12:20 to 12:50

  • Brought to you by Nutanix Add to Schedule

    Cloud Architecture Theatre

    Wed 25th Apr 12:20 to 12:50

  • Brought to you by Bomgar Add to Schedule

    Cyber Threat Protection Theatre

    Wed 25th Apr 12:20 to 12:50

  • Brought to you by Kite Distribution Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 25th Apr 12:20 to 12:50

  • PANEL: IP EXPO Bytesize Panel, future trends – Blockchain, Serverless, Machine Learning & Edge Computing Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 12:20 to 13:20

    PANEL: IP EXPO Bytesize Panel, future trends – Blockchain, Serverless, Machine Learning & Edge Computing

    4 of the hottest trends in IT explained in 45 minutes!!

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.

    Speakers

    Photo Speaker Name Profile
    Angie Ma Angie Ma View Profile
    James Allerton Austin James Allerton Austin View Profile
    Joe Baguley Joe Baguley View Profile
    Lorna Mitchell Lorna Mitchell View Profile
    Manek Dubash Manek Dubash View Profile
  • Wed 25th Apr 13:00 - 13:30
  • Brought to you by Kite Distribution Add to Schedule

    Cyber Threat Protection Theatre

    Wed 25th Apr 13:00 to 13:30

  • An Introduction To Hyper-Converged Infrastructure Add to Schedule Tony Stimson  |   Pivot3   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 13:00 to 13:30

    An Introduction To Hyper-Converged Infrastructure

    This session provides an introduction to Hyper-Converged Infrastructure in simple terms.  It covers modern day datacentre challenges and how innovators evolve using hyper-converged infrastructure to meet business demands.  Attendees will gain an understanding of use case workloads and how Hyper-converged technology delivers performance, agility and resiliency.  The session will also cover specific features and how these translate to tangible business benefits using real-life case studies.

    Speaker

    Photo Speaker Name Profile
    Tony Stimson Tony Stimson View Profile
  • Scaling Sparta: Military Lessons For Growing A Dev Team Add to Schedule Emily Freeman  |   Kickbox  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Wed 25th Apr 13:00 to 13:30

    Scaling Sparta: Military Lessons For Growing A Dev Team

    Scaling systems is hard. Scaling people? That’s significantly harder. So how do you scale a team of two to twenty? The answer starts over 2,000 years ago in Sparta. This talk will focus on 3 distinct military organizations and apply the lessons learned to our development teams and organizations.

    Speaker

    Photo Speaker Name Profile
    Emily Freeman Emily Freeman View Profile
  • Brought to you by Darktrace Add to Schedule

    IOT, analytics & AI Theatre

    Wed 25th Apr 13:00 to 13:30

  • Wed 25th Apr 13:40 - 14:10
  • The Cyber Crystal Ball Add to Schedule Rik Ferguson  |   Trend Micro   |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 13:40 to 14:10

    The Cyber Crystal Ball

    This session will examine the drivers of change in the technology arena and the areas in which that change will be most keenly felt. Nation-states and their surrogates, the collision of the digital and physical worlds and developments in the technological and threat landscapes mean that security and security professionals must adapt to survive. This presentation will attempt to cast some light on a cloudy future.

    Speaker

    Photo Speaker Name Profile
    Rik Ferguson Rik Ferguson View Profile
  • Brought to you by Aerohive Add to Schedule

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 13:40 to 14:10

  • Brought to you by Zerto Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 13:40 to 14:10

  • Focus on business value by going serverless Add to Schedule Henry Been  |   Consultant & Speaker  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Wed 25th Apr 13:40 to 14:10

    Focus on business value by going serverless

    The cloud promises that it enables us to develop software faster than ever before. However, most companies are still developing ‘the old way:’ creating and maintaining virtual machines to host their software. There is more automation nowadays, but there are still a lot of not value adding activities being performed.

    In this session Henry will explore the serverless paradigm and how you can cut down on investing in infrastructure and maintenance and focus on delivering business value and creating satisfied end-users.

    This session will not be over, before you have seen a live serverless demo!

    Speaker

    Photo Speaker Name Profile
    Henry Been Henry Been View Profile
  • The convergence of Data Science and Software Development Add to Schedule Margriet Groenendijk  |   IBM  |   IOT, analytics & AI

    IOT, analytics & AI Theatre

    Wed 25th Apr 13:40 to 14:10

    The convergence of Data Science and Software Development

    In order to move past the hype and achieve the full potential of machine learning, data scientists and software developers need to work more closely together towards their common goal of delivering well-architected, data-driven applications. Every industry is in the process of being transformed by software and data. It is in the collaboration between data scientists and software developers where the real value can be found by creating integrated data workflows that benefit from the unique knowledge and skillsets of each discipline.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • Brought to you by Silver Peak Add to Schedule

    Cloud Architecture Theatre

    Wed 25th Apr 13:40 to 14:10

  • Brought to you by Watchguard Add to Schedule

    Cyber Threat Protection Theatre

    Wed 25th Apr 13:40 to 14:10

  • Wed 25th Apr 14:20 - 14:50
  • How Citrix is helping Aston Martin Red Bull Racing drive the Future of Work Add to Schedule Christian Reilly  |   Citrix  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 14:20 to 14:50

    How Citrix is helping Aston Martin Red Bull Racing drive the Future of Work

    Find out how Aston Martin Red Bull Racing is powering their new mobile workforce and learn about the cutting-edge tech that’s speeding up the shift to digital business and how you can use it to your advantage.

    Speaker

    Photo Speaker Name Profile
    Christian Reilly Christian Reilly View Profile
  • Brought to you by Efficient IP Add to Schedule

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 14:20 to 14:50

  • Brought to you by Nasuni Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 14:20 to 14:50

  • Brought to you by Sungard Add to Schedule

    Cloud Architecture Theatre

    Wed 25th Apr 14:20 to 14:50

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 25th Apr 14:20 to 14:50

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen! Add to Schedule Ben Jenkins  |   Datto   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Wed 25th Apr 14:20 to 14:50

    How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen!

    We all know Ransomware is out there but do we ever truly believe that we will be the next victims to fall into the trap? How would you know if a hacker was living behind your screen, manipulating your computer into doing things that were beyond your control? Datto's industry leading technology stack has the ability to detect Ransomware infections and bring systems back online in a matter of seconds on our platform built specifially for MSP’s! Come and witness us live in action to see how we are putting Ransomware cyber criminals out of business!

    Speaker

    Photo Speaker Name Profile
    Ben Jenkins Ben Jenkins View Profile
  • Wed 25th Apr 15:00 - 15:30
  • "Crypto Wars: The Legal Menace” – an unstoppable GDPR force meets an immovable national security object Add to Schedule David Cook  |   Eversheds Sutherland  |   Keynote Theatre

    Keynote Theatre Theatre

    Wed 25th Apr 15:00 to 15:30

    "Crypto Wars: The Legal Menace” – an unstoppable GDPR force meets an immovable national security object

    The direction of travel for cyber security controls is clearly signposted by the Network and Information Security Directive (NISD), the General Data Protection regulation (GDPR) and other new global standards. 

    Meanwhile, a Crypto War is raging that has its genesis at the end of the Second World War and the surveillance elements of the Cold War. Attempts to fetter the ability of individuals and companies to use encryption methods are frequently being played out on the world stage.

    The collision is imminent. The law is ready to pierce us on the horns of a dilemma. How have we got here and what happens next?

    qvghq kvybl bbdsu giklv inwdc xarxy xqdjv oakvx cduyx xislz gaivd zcbmp jvric nbldl wxemp aiomf cgxy

    Speaker

    Photo Speaker Name Profile
    David Cook David Cook View Profile
  • End User Compute in the modern workplace. Add to Schedule Tech Leaders  |  Cloud, Networks & Mobility

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 15:00 to 15:30

    End User Compute in the modern workplace.

    •Security in the workplace: most common data breaches how IGEL security developments new security developments we are working on.
    •Users and their endpoints in the workplace: how do you access your company data across devices and locations?
    •Migration in the workplace: managing OS and platform migrations with client devices.
    •Managing the laptop bag: managing multiple endpoints, the IGEL solution.

    Speakers

    Speaker Name Profile
    Gordon Cass Gordon Cass View Profile
    Mathew Patterson View Profile
  • Brought to you by Rubrik Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Wed 25th Apr 15:00 to 15:30

  • Build a Serverless Data Pipeline Add to Schedule Lorna Mitchell  |   IBM Watson Data Platform  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Wed 25th Apr 15:00 to 15:30

    Build a Serverless Data Pipeline

    Bringing data in from external sources, handling updates to databases and notifications to external systems: this talk is a case study of building a simple stackoverflow dashboard application in a fun and practical way.

    Come to this session for an overview of how we built a serverless pipeline to pull in data and serve as the backend behind the stackoverflow dashboard I built for my team of Developer Evangelists.  With data coming in from an external API plus updates to the data after it has arrived, there were some design decisions to make.  I'll share those decisions and talk about the ones we've iterated on and might alter in the future.  This talk is suitable for developers of all technical stacks.

    Speaker

    Photo Speaker Name Profile
    Lorna Mitchell Lorna Mitchell View Profile
  • Brought to you by Navisite Add to Schedule

    Cloud Architecture Theatre

    Wed 25th Apr 15:00 to 15:30

  • The future impact of AI in cybercrime Add to Schedule Dave Palmer  |   Darktrace  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 25th Apr 15:00 to 15:30

    The future impact of AI in cybercrime

    In the coming era of widespread automation, self-learning machines, and improving AI, there will be changes in cybersecurity. Dave Palmer, Director of Technology, will discuss how AI will have a profound impact on our future internet; including how it can further enable digital criminals, and what we can do about it as defenders.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Brought to you by Splunk Add to Schedule

    Cyber Threat Intelligence Theatre

    Wed 25th Apr 15:00 to 15:30

  • Web application security, why so hard? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Wed 25th Apr 15:00 to 16:00

    Web application security, why so hard?

    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itself, its framework, the web server or proxy server configuration, or even some third-party component (e.g. such as a JavaScript library that is embedded on each web page) to lead to full compromise of a host or network.

    In this session we will talk both generally about the trends in web application security and look at specific examples of how key vulnerabilities arise (e.g. discussing how, without adequate sanitisation, tainted user input can reach dangerous functions within some layer of the system), paying particular attention to those more subtle cases that usually go under the radar, such as within HTML5 applications.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Wed 25th Apr 15:40 - 16:10
  • Brought to you by Paessler AG - PRTG Network Monitor Add to Schedule Martin Hodgson  |   Paessler AG   |   Cloud, Networks & Mobility

    Cloud, Networks & Mobility Theatre

    Wed 25th Apr 15:40 to 16:10

    Brought to you by Paessler AG - PRTG Network Monitor

    Paessler AG’s award winning PRTG Network Monitor is a powerful, affordable and easy-to-use Unified Monitoring solution. It is a highly flexible and generic software for monitoring IT infrastructure, already in use at enterprises and organizations of all sizes and industries. 218,151 IT administrators in more than 170 countries rely on PRTG and gain peace of mind, confidence and convenience. Founded in 1997 and based in Nuremberg, Germany, Paessler AG remains a privately held company that is recognized as both a member of the Cisco Solution Partner Program and a VMware Technology Alliance Partner.

    Speaker

    Photo Speaker Name Profile
    Martin Hodgson Martin Hodgson View Profile
  • Brought to you by Cato Networks Add to Schedule

    Cyber Threat Protection Theatre

    Wed 25th Apr 15:40 to 16:10

  • PANEL: IP EXPO Hot Topic Panel – Artificial Intelligence Add to Schedule

    Keynote Theatre Theatre

    Wed 25th Apr 15:40 to 16:40

  • Thu 26th Apr 10:00 - 10:40
  • Opening Keynote - Dr Hannah Fry Add to Schedule Dr Hannah Fry  |     |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 26th Apr 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Dr Hannah Fry Dr Hannah Fry View Profile
  • Thu 26th Apr 11:00 - 11:30
  • Brought to you by Microsoft Add to Schedule James Akrigg  |   Microsoft Ltd  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 26th Apr 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    James Akrigg James Akrigg View Profile
  • Brought to you by 8x8 Add to Schedule

    Cloud, Networks & Mobility Theatre

    Thu 26th Apr 11:00 to 11:30

  • Brought to you by Nutanix Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 11:00 to 11:30

  • Brought to you by CHEF Add to Schedule

    DevOps & Serverless Theatre

    Thu 26th Apr 11:00 to 11:30

  • IOT, analytics & AI Theatre

    Thu 26th Apr 11:00 to 11:30

  • Brought to you by CloudDNA Add to Schedule Al Taylor  |   cloudDNA   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 26th Apr 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Brought to you by Forcepoint Add to Schedule

    Cyber Threat Protection Theatre

    Thu 26th Apr 11:00 to 11:30

  • Brought to you by Kite Distribution Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 26th Apr 11:00 to 11:30

  • Web application security, why so hard? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Thu 26th Apr 11:00 to 12:00

    Web application security, why so hard?

    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itself, its framework, the web server or proxy server configuration, or even some third-party component (e.g. such as a JavaScript library that is embedded on each web page) to lead to full compromise of a host or network.

    In this session we will talk both generally about the trends in web application security and look at specific examples of how key vulnerabilities arise (e.g. discussing how, without adequate sanitisation, tainted user input can reach dangerous functions within some layer of the system), paying particular attention to those more subtle cases that usually go under the radar, such as within HTML5 applications.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Thu 26th Apr 11:40 - 12:10
  • Infrastructure, Data and Bloodhound Supersonic Car: what it means for your Enterprise Cloud Add to Schedule Jason Rees  |   Oracle Cloud Technology Foundations, for UK, Ireland and Israel.  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 26th Apr 11:40 to 12:10

  • Brought to you by Cohesity Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 11:40 to 12:10

  • Brought to you by Pure Storage Add to Schedule

    IOT, analytics & AI Theatre

    Thu 26th Apr 11:40 to 12:10

  • Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Security Add to Schedule Greg Iddon  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 26th Apr 11:40 to 12:10

    Deep Dive Into Deep Learning : How AI is Powering the Future of Endpoint Security

    Sophos' Greg Iddon peels back the layers of jargon surrounding the machine learning field and explains how the security industry is supplementing reactive, human-based malware research with predictive machine learning models to defend against the relentless onslaught of malware.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected. Add to Schedule Richard Flanders  |   Check Point Software Technologies   |   Cyber Threat Intelligence

    Cyber Threat Intelligence Theatre

    Thu 26th Apr 11:40 to 12:10

    Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected.

    Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.

    Speaker

    Photo Speaker Name Profile
    Richard Flanders Richard Flanders View Profile
  • Thu 26th Apr 12:20 - 12:50
  • Patching - A Death Star Analysis Add to Schedule

    Cloud, Networks & Mobility Theatre

    Thu 26th Apr 12:20 to 12:50

    Patching - A Death Star Analysis

    Whether it was Meltdown, Spectre, Wannacry, or the countless other malware and ransomware attacks over the past few years, the same conclusions are generally made... If you have a vulnerability, remediate it! Sean Herbert, Country Manager UK for baramundi software explores some examples and best practices for your patching processes with some real (and other worldly) examples of where it went wrong.

  • Brought to you by Veeam Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 12:20 to 12:50

  • Brought to you by Splunk Add to Schedule

    IOT, analytics & AI Theatre

    Thu 26th Apr 12:20 to 12:50

  • Brought to you by Sungard Add to Schedule

    Cloud Architecture Theatre

    Thu 26th Apr 12:20 to 12:50

  • Brought to you by Egress Add to Schedule

    Cyber Threat Protection Theatre

    Thu 26th Apr 12:20 to 12:50

  • Confessions of a Hacker Add to Schedule

    Keynote Theatre Theatre

    Thu 26th Apr 12:20 to 13:20

  • Thu 26th Apr 13:00 - 13:30
  • How to Recover from a disaster LIVE! Powered by Liquid Nitrogen! Add to Schedule Ben Jenkins  |   Datto   |   Hyperconvergence, Storage & Backup

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 13:00 to 13:30

    How to Recover from a disaster LIVE! Powered by Liquid Nitrogen!

    Your business runs 365 days a year; your systems run 24/7; your data is needed in real-time. To ensure your business continuity is to proactively protect your systems and data against disasters of all types.Are you sick and tired of liquid nitrogen always freezing your servers and plunging your business into downtown. Do the ice cold temperature destroy your data, cool your customers and put a crack in your profits?! If you’re having the same trouble, why not come along to our session and see how we recover an encrypted, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSP’s and we have the answers you need! Wrap up warm! This is a demo you won’t want to miss!

    Speaker

    Photo Speaker Name Profile
    Ben Jenkins Ben Jenkins View Profile
  • Cloud Blind-Spots: Illuminate Every Network with ThousandEyes Add to Schedule Ian Waters  |   ThousandEyes   |   Cloud, Networks & Mobility

    Cloud, Networks & Mobility Theatre

    Thu 26th Apr 13:00 to 13:30

    Cloud Blind-Spots: Illuminate Every Network with ThousandEyes

    For most companies the cloud is now part of their wide area network, whether it's employee apps accessed via the major cloud providers or migrating their own applications to cloud based platforms. The challenge is that the public internet and cloud provider networks are invisible for most organisations, so if there's a problem, what happens? ThousandEyes provides visibility into all networks, including the ones you don't own; it's monitoring, just for the cloud era. To find out more and see ThousandEyes in action come and check out our session.

    Speaker

    Photo Speaker Name Profile
    Ian Waters Ian Waters View Profile
  • Brought to you by RepKnight Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 26th Apr 13:00 to 13:30

  • From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing Add to Schedule Matt Jarvis  |   Mesosphere Inc  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Thu 26th Apr 13:00 to 13:30

    From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing

    Data processing paradigms are undergoing a paradigm shift as we move more and more towards real time processing. Emerging software models such as the SMACK stack are at the forefront of this change, focused on a pipeline processing model, but are also introducing new levels of operational complexity in running multiple complex distributed systems such as Spark, Kafka and Cassandra. In this talk, I'll introduce both Apache Mesos and DC/OS as a solution to this growing problem, and describe the benefits are of running these new kinds of systems for emerging cloud native workloads.

    Speaker

    Photo Speaker Name Profile
    Matt Jarvis Matt Jarvis View Profile
  • Thu 26th Apr 13:40 - 14:10
  • Brought to you by Gamma Add to Schedule

    Cloud, Networks & Mobility Theatre

    Thu 26th Apr 13:40 to 14:10

  • Brought to you by Zerto Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 13:40 to 14:10

  • Beyond DevOps - Operability for Serverless and IoT Add to Schedule Matthew Skelton  |   Conflux Digital Ltd  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Thu 26th Apr 13:40 to 14:10

    Beyond DevOps - Operability for Serverless and IoT

    Focus on operability to get the best out of Serverless and IoT

    Working with Serverless and IoT platforms means that much of the infrastructure “heavy lifting” has been done by the cloud vendor, leaving engineering teams free to focus on operability as a key differentiator for products and services.

    Background: DevOps practices have been hugely valuable over the past 10 years in making software systems more resilient, reliable and valuable for users. However, many of the challenges that DevOps set out to solve are being addressed by cloud vendors at a rapid pace: application platforms, automated deployments, dynamic infrastructure provisioning, and more. Organisations starting their digital transformations in 2018 and beyond should look to new approaches such as Serverless and the cloud vendor IoT offerings and avoid older approaches such as IaaS and even containers.

    Speaker

    Photo Speaker Name Profile
    Matthew Skelton Matthew Skelton View Profile
  • Brought to you by Silver Peak Add to Schedule

    Cloud Architecture Theatre

    Thu 26th Apr 13:40 to 14:10

  • Brought to you by My1login Add to Schedule

    Cyber Threat Protection Theatre

    Thu 26th Apr 13:40 to 14:10

  • Brought to you by Gemalto Add to Schedule

    Cyber Threat Intelligence Theatre

    Thu 26th Apr 13:40 to 14:10

  • Thu 26th Apr 14:20 - 14:50
  • Brought to you by Google Add to Schedule Nick Martin  |   Google  |   Keynote Theatre

    Keynote Theatre Theatre

    Thu 26th Apr 14:20 to 14:50

    Speaker

    Speaker Name Profile
    Nick Martin View Profile
  • Microsoft Teams, The Future of Collaboration in Office 365? Add to Schedule Tom Arbuthnot   |   Modality Systems  |   Cloud, Networks & Mobility

    Cloud, Networks & Mobility Theatre

    Thu 26th Apr 14:20 to 14:50

    Microsoft Teams, The Future of Collaboration in Office 365?

    Microsoft Teams is available to 181 markets and is already used by over 125,000 enterprises. It’s a chat-centric collaboration tool that brings together all the services in Office 365 including Calling, Video, Conferencing and integration with many applications.

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Brought to you by Nasuni Add to Schedule

    Hyperconvergence, Storage & Backup Theatre

    Thu 26th Apr 14:20 to 14:50

  • Containers, Kubernetes and Cloud Add to Schedule Mete Atamel  |   Google  |   DevOps & Serverless

    DevOps & Serverless Theatre

    Thu 26th Apr 14:20 to 14:50

    Containers, Kubernetes and Cloud

    Creating a single microservice is a well understood problem. Creating a cluster of load-balanced microservices that are resilient and self-healing is not so easy. Managing that cluster with rollouts and rollbacks, scaling individual services on demand, securely sharing secrets and configuration is even harder. Kubernetes, an open-source container management system, can help. In this talk, we will start with a simple microservice, containerize it using Docker, and scale it to a cluster of resilient microservices managed by Kubernetes. Along the way, we will learn what makes Kubernetes a great system for automating deployment, operations and scaling of containerized applications.

    Speaker

    Photo Speaker Name Profile
    Mete Atamel Mete Atamel View Profile
  • Brought to you by Park Place Technologies Add to Schedule

    Cloud Architecture Theatre

    Thu 26th Apr 14:20 to 14:50

  • GDPR: How to Tackle Consent and Preference Management Add to Schedule Ian Evans  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 26th Apr 14:20 to 14:50

    GDPR: How to Tackle Consent and Preference Management

    Consent is an active area that many organizations are currently struggling with in GDPR (and ePrivacy). Consent impacts both B2B and B2C marketing activities, as well as deeper business activities that may require consent such as automatic decision making, processing special categories of data, or cross-border data transfers. This session will help clarify why consent is so unique in GDPR, when you do (and don’t) need consent, and practical case studies of how to tackle consent, re-consent, and preference management in practice.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thu 26th Apr 15:00 - 15:50
  • PANEL: IP EXPO Bytesize Panel, the year ahead – Brexit, GDPR, Diversity & SD WAN Add to Schedule

    Keynote Theatre Theatre

    Thu 26th Apr 15:00 to 15:50

    PANEL: IP EXPO Bytesize Panel, the year ahead – Brexit, GDPR, Diversity & SD WAN

    Learn about the most pressing concerns for the year ahead summarized in 45 minutes!

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top